President Eisenhower said to 2 CIA Officers, in the Oval Office :
" —We called the people in from MJ-12, from Area 51 and S-4,
but they told us that the government had no
jurisdiction over what they were doing...
| want you and your boss to fly out there.
| want you to give them a personal message...
| want you to tell them, whoever is in charge,
| want you to tell them, that they have this coming week to get
into Washington, and to report to me.
And if they don't, l'm going to get the First Army from Colorado,
we are going to go over and take the base over.
| don't care what kind of classified material you got.
We are going to rip this thing apart."
š
w
*
..
“ee
`
ё
“ ...: о Фи 7 ‚ +» № .
A LOT OF SHIT IN SPACE ABOVE AND AROUND 05. ^ ..
—1 THINK I CAN COUNT TO 3000 RF SATELLITES. j".
.
E mE =
,
.
r : | ы
Фе...” « " E Ее ‘ Je 2 .
. * ' oot - , | а er
ж e Е Д ° - , L] А A "^ » . 4
е a“ 4 .. " ° : re `. е АЖ е”,
* ч è ... . . 6
2 Y а“ * 2 y^. k
. , > , .
. E . »
` - ы
" .
Ф “
`...
. .
-.
в” 4 .
^ я
e" $> Va. >
Ж,
INTRODUCTION.
14 - START READING RIGHT HERE.
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
15
16
17
126
127
146
150
154
157
159
294
300
303
315
325
327
329
330
341
361
371
374
464
504
508
528
530
574
576
581
EXTRAS:
PAGE
PAGE
FHH
583
612
THE ROSWELL COVER-UP PART 2. PART ONE CAN BE READ LATER IN THIS DOCUMENT.
ROSWELL NEWSPAPER FRONTPAGE FROM 08 JULY 1947.
PHOTOGRAPHS OF EXRATERRESTRIAL (E.T.) DEAD BODY ON AMERICAN MILITARY AUTOPSY TABLE. 3 PHOTOS INCLUDING ONE ON IT'S BRAIN.
NEWLY ELECTED PRESIDENTS UFO BRIEFING DOCUMENTS FROM 18 NOVEMBER 1952. PAGE 20-26. ***
SHORT DESCRIPTIONS AND MY OWN PERSONAL PHOTOS OF DWIGHT D. EISENHOWER, HARRY S. TRUMAN, VANNEVAR BUSH, JAMES FORRESTAL AND MJ-1 HILLENKOETTER.
TAGGED AND BROKEN I-BEAM OF EXTRATERRESTRIAL UNKNOWN MATERIAL WITH HIEROGLYPHS. THE I-BEAM HAS A LIGHT-PURPLE COLOR.
DEAD ALIEN ON AUTOPSY TABLE.
THE REAL USA GOVERNMENT COUNTERSTRIKE UFO MANUAL - "EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY, RECOVERY AND DISPOSAL" - PRINTED 1954. AND LAST EDIT IN IT ARE FROM 1957. ***
ALIEN INSCRIPTIONS - SKETCH MADE BY JESSE MARCEL JUNIOR IN 1989 SHOWING THE ENGRAVED SYMBOLS FROM A SPACESHIP I-BEAM.
ALIEN INSCRIPTIONS - HAVE THE ROSWELL U.F.O. DEBRIS SYMBOLS BEEN DECIPHERED. SHORT BACKGROUND.
ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS WHEN A U.S. ARMY OFFICER HOLDS THE I-BEAM.
ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS THE I-BEAM WITH IT'S CORRECT ITEM TAG.
NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS SPACESHIP CONTROLS FOR 6-FINGER HANDS.
INFORMATION ON THE AREA 51 S4 FACILITY BASED ON 3 PERSONS WHO CLAIMS THAT THEY HAVE WORKED THERE.
INFORMATION ON THE DULCE MILITARY DNA FACILITY THAT CROSSBREEDS ANIMALS AND HUMANS. BASED MOSTLY ON 2 PERSONS WHO HAVE CLAIMED TO WORKED THERE. ONE HAS GONE MISSING INCLUDING HIS WHOLE FAMILY.
THE PHOTO SECTION IN THIS SWEDISH REPORT. SEE THE FIRST PHOTO OF A 6-FINGERED EXTRATERRESTRIAL INDIVIDUAL.
HOW CAN YOU PLACE "AN OBJECT OR FLUID ON THE OTHER SIDE" - AND EXACTLY WHAT IS "THE SNAKE" MENTIONED IN THE HOLY BIBLE, OR "THE SERPENTS" ANCIENT CIVILISATIONS SPOKE OF.
THE PHOTO SECTION CONTINUES WITH MORE PHOTO'S, MAPS, SATELLITE IMAGES AND TECHNICAL DATA. THE FIRST IMAGE SHOWS A CUBAN AIRPORT WITH ALIEN SPACESHIP LANDING MARKINGS.
ROSWELL DISPATCH NEWSPAPER FRONTPAGE FROM 09 JULY 1947.
EXTRATERRESTRIAL ALIEN POETRY AND WISDOM.
PHOTO OF SOME KIND OF "E.T. WEAPON". Obviously, one can determine that the electric lighting comes from the beam pointed down. The picture is real and not photoshopped.
DIFFERENT RADAR DESCRIPTIONS. PRIMARY AND SECONDARY RADAR SCREENS.
UNITED STATES PATENTS ABOUT BRAINWAVES AND REMOTE ANTENNA MINDCONTROL.
UNITED STATES ACTIVE DENIAL TRUCKS. PUBLIC EXPLANATION ARE BURNING SKIN GROUP CONTROL. BUT ACTIVE DENIAL CAN SUPPRESS THOUGHTS SO SOME DECISIONS BECOME IMPOSSIBLE TO PERFORM.
OUR OWN FEDERAL AVIATION ADMINISTRATIONS AIR TRAFFIC SURVEILLANCE - THAT E.T. TAPPED IN TO, OR HAVE SYSTEM ACCESS TO. THEY KNOW WHERE ALL OUR AIRCRAFT ARE - WHEN FAKING A AIRPORT.
RADIO AND ELECTRO MAGNETIC RADIATION SAFETY LEVELS.
EMF AND RF SAFETY LEVELS - A COMPARATIVE GUIDE.
NOT FOR PUBLIC INSPECTION. ONE PAGE DOCUMENT FRAGMENT.
TWO PAGE DOCUMENT THAT MENTION PROFESSOR ALBERT EINSTEIN AS THE PROJECT JEHOVA DIRECTOR. [Document found in John Foster Dulles security safe. ]
PHOTO OF JOHN FOSTER DULLES. [He served as United States Secretary of State under President Eisenhower 1953-1959.]
CLEAN WRITING OF THE ABOVE TWO PAGE DOCUMENT. [Document from above that was found in John Foster Dulles security safe, now with clean text, and easier to read. ]
MJ-12 TOP SECRET/MAJESTIC / THE FIFTH ANNUAL REPORT END CONCLUSION. THE REPORT ARE REAL U.S. GOVERNMENT PROPERTY. ***
U.S. PATENT - APPARATUS FOR AUDIBLY COMMUNICATING SPEECH USING THE RADIO FREQUENCY HEARING EFFECT.
WHAT ARE THE EXTRATERRESTRIALS DOING HERE *EXACTLY*. HERE IS A SHORT SUMMARY. THIS IS WHAT THEY DO, IF, THEY, THEORETICALLY, EXIST.
PENTAGON AND THE U.S.A. DEFENSE BUDGET 2017-2018. INCLUDES DESCRIPTIONS OF ALMOST ALL WEAPON SYSTEMS AND THE AIR FORCE ONE.
THE NSA COMPUTER NETWORK SECURITY GUIDE. MOST NSA SPY SERVERS ARE LISTED WITH THEIR OPERATING TCP/UDP PORTS. READ WHAT THE NATIONAL SECURITY AGENCY SAY YOU SHOULD BLOCK.
CIA AND THE HAVANA SYNDROME.
NEW PHOTO SECTION: MORE AREA 51 PHOTOS.
TWICE THE SPEED OF LIGHT.
ALL USA INTELLIGENCE AGENCIES BLACK BUDGETS 2013.
BOKSTAVERINGSALFABETET. SWEDISH AND INTERNATIONAL.
PHOTO ON U.F.O. CHASED BY THE U.S. MILITARY.
AUTHORS IDENTIFICATION.
CLEAN WRITING OF THE MJ-12 MANUAL. THESE PAGES ARE EASIER TO READ.
A DIRECTIVE TO THE UNITED STATES COMMUNICATIONS AND INTELLIGENCE BOARD (USCIB). SUBJECT: COMMUNICATIONS INTELLIGENCE ACTIVITIES. WRITTEN 24:TH OCTOBER 1952. ***
GO BACK TO PAGE 97 - AND IN THE PHOTO SECTION OF THIS REPORT // SEE THE DOCUMENT ABOUT MURDERING SECRETARY OF DEFENSE FORRESTAL THAT WISHED TO GO PUBLIC WITH U.F.O.
First he was placed in a mental hospital, and then he was thrown out of a window there.
Did they give him a poison before he went to the mental hospital?
All pictures are real and not photoshopped. There are more than 100 photos and images herein.
© SWEDISH DEEP INVESTIGATION MADE AND PRODUCED BY GUSTAV NORSTRÓM DATE 2023-03-24.
Working on behalf of the Royal Kingdom of Sweden for all Governments worldwide.
*** = ALL THE 1950"5 DOCUMENTS INDEXED ABOVE ARE REAL U.S. GOVERNMENT PROPERTY.
I don't personally speculate in this REPORT, about the accuracy and written truths served to you from these 1950's documents.
I only guarantee you that the old external documents published herein this SWEDISH PDF REPORT, are real U.S. GOVERNMENT PROPERTY from the 1950's.
Educate yourself by reading these GOVERNMENT PAPERS.
THE U.F.O. BASIC KNOWLEDGE
ОМ THE GOVERNMENT TABLE
BIBLE .
Document: Heavy National Security PDF u
This Portable Document File (PDF) was created during the
United States Presidency Times, with Joe Biden as acting
President.
3 / 569
The intelligence cycle.
WILL BE acquired, and are then later converted into
real intelligence.
WHAT 15 INFORMATION?
ПРОЕМА ТО Нева: may Бе fragmentary, contradictory,
unreliable, ambiguous, deceptive, foreign or
Ц
completely wrongs Example: He bought a hat for € 288.
А = E E
The information is evaluated and analysed and often combined
with other sources of information.
Example HUMINT: He bought a * BLACK hat for € 288.
Example SIGINT: *And he texted his father it was nice.
NOW YOU HAVE YOURIRAW INTELLIGENCE
INTELLIGENCE are information that has been
collected, integrated, evaluated, analyzed and
interpreted [correctly] .
p Example: Mr. C bought a black hat he texted was nice and it was on sale for
€ 288 Euro. A real bargain according to his fathers textreply the same day.
THE FINAL PRODUCT OF THE INTELLIGENCE CYCLE.
- Ready to be delivered to the topload and all the
Government Departments and all it's Policymakers!
Result = Every government employee wears black hats for € 288 Euro.
шшш ТЕР
\
9112. қ
wil!
нні"
2 N
| us dU
aa
E
t — GR IM
Ü
Update on U.S. Government and Extraterrestrials.
2023-02-03 CET 17:58.
i
4 / 569
5/570
—
—_
Gustav Norstróm
U.S. Department of Defense
6 / 570
5 / 569
BA OIF SUH -RI E E4?
$ L| > ОНЕ 2030 OHS) HIS CAI EA 4045 = 8/1009 961.27 2201
6/569 Ж...
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
7 / 569 8/570
«See rs.
8 / 569 1/340 9/570
YOU MUST START SOMEWHERE
SO START RIGHT HERE:
THE COVER-UP PART TWO.
The ranch owner was picked up b о ranch, and aen to the house of the owner, of the local
Roswell Radio Station, KGBL, to be interviewed. A recording of the interviewWas made, and the
station planned to broadcast it the next morning. But before it could be broadcasted Brazel was
taken into custody by members of the Military Ройсезапа his exclusive inte became
confiscated.
The Federal Соттипіса йе Commission (reporte le been through the of T.J. Slowie,
Secretary of the Соттіз єп), warned radio statio el that the matter >d National
"+ Security and should KGF any portion of the int ssue any informat arding it, they
would lose their broad
Sometime later Brazel showed up at KGFL Radio Station escorted by Military Officers,where he then
told the "truth" about the debris found on his ranch. Brazel took back his initial story, instead
claiming now, that he first found the debris in middle of June, in 1947, and NOT the morning of
Saturday, July 5, in 1947, as he first told them.
And that it was a simple weather balloon.
The reasons for the cover-up by the Military, came via order from United States
President, who wanted to avoid panic. A good comparison for understandment would
be: Think that the Soviet Union was the first to posses the atomic bomb.
Something like that. And these "visitors" can not be trusted.— AMEN! And GOOD LUCK!
же
п TA Р d t ^ ) г T = =
АШАН This is МОТ a weather balloon.
vation balloons on ‘he ranch. bu = = >
at Doon ta found иа гадини, ey And this United States Army hand is not fake.
not in any way rescmblie cither
of these
T am sure what I found was
по, any weather observation
balloon," һе sald. "But if I find
anything else, besides а bomb, they
are golng to Маус а hard
gelling me to say anything abo
B4 =
10 / 569 11/570
ny BER т ЗИ
п н ' pun pu Пер ША пи e
iim duced dg aa
И И
m ІШКІ a
Ен р iti 1
е И ел td rat ШИЕ
MARO ЕРҒАТ н ШИН h БИ kme nus
i lii Шы! {ЫНЫ ИШ] * | ШІ |
ө Ri 1 "LE ДЕАШ " | чү Et Eu: ( қ НІМ i
i ЛІ | lur quie ҮН h ШШ. ДШ, | ii br i
| HET e ek 1
Ш Пи Пия ще jl
THE UO INTR Яп НЕГЕ u qt ih 7
ШЕНЕ 6 | р
g Saucer
in Roswell Reg
i tit
lon
в
tz [ng Carol Weds Mme шеу»
Roo Off. |
-.. apo —
із”
in
No Details of
"4 Disk
evealed
Are
| 1 ‚| iin P н ННІ ji ү Ir me p T
P
| Де
spur: ip T Т
|: Hr inii th ; i ae
Г) D.
f rp ҮЛ Г
И "К ІІІ?
а НЕШЕ ЧЕ Ши
ша ра пи ENT
р - Т үрге t "4. Үн
инин И pi ҮТ ji си ар: m i
Is: от mr
ТЫП ИА ГЕШ. | :
| vM C TC i БШ! \
Реми Way te Talks F|
"о oes
De Arms h.
"Ram.
slee а mom
Comoe
vom Tm
RAAF Captures Fly
On Ranch
House Passes (ест?) (әкі
Tax Slash by
Large Margin
LET
^
Claims Army
3 В Stacking
mad (Courts Martial
a
E
c
w
Q
ва
<
=
ға
=
<
3
т
5
"á
it
Some of Soviet Satellites
May Afiend Paris Meeting
irt НГ,
Welcome to Planet Earth",
Vintergatan.
A translation would be:
-Уа1котпа till Sverige!
We know the most.
14 / 570
TOP SECRET / MAJIC Е
МАТІ онаша са PN (Miu? ток
47 Erie PILLS
* TOP SECRET *
РУТА,
EYES ONLY COPY ONE OP СМЕ.
BRIEFING DOCUMENT: OPERATION MAJESTIC 12
PREPARED FOR PRESIDENT-ELECT DWIGHT D. EISENHOWER: (EYES ONLY)
18 NOVEMBER, 1952
WARNING: This is а TOP SECRET - EYES ONLY document containing
compartmentalized information essential to the national security
of the United States. EYES ONLY ACCESS to the matemial herein
1s strictly limited to those possessing Majestiíc-12 clearance
level, Reproduction in any form or the taking of written or
~ mechanically transcribed notes 18 strictly forbidden.
MASZIZIITTTTTI"
ТОР:$ С Е/ MAJIC рев (е
15 / 569 OPNS РЕ ONI Y 16V 570
16 / 569
TOP SECRET / MAJIC 092
EYES..QNI-Y
* TOP SECRET *
s.............
COPY ONE OF ONE.
EYES ONLY ONE OF ONE
SUBJECT: OPERATION MAJESTIC-12 PRELIMINARY BRIEFING FOR
PRESIDENT-ELECT EISENHOWER.
DOCUMENT PREPARED 18 NOVEMBER, 1952.
BRIEFING OFFICER: ADM. ROSCOE H. HILLENKOETTER (м2-1)
NOTE: This document has been prepared аз а рге11т1пагу briefing
only. It should be regarded as introductory to & full operations
briefing intended to follow.
OPERATION MAJESTIC-12 is а TOP SECRET Research and Development/
Intelligence operation responsible directly and only to the
President of the United States. Operations of the rk rs are
carried out under control of the Majestic-12 (Majic-12) Group
which was established by special classified executive order of
President Truman on 24 September, 1947, upon recommendation by
Dr. Vannevar Bush and Secretary James Forrestal. (See Attachment
"д",) Members of the Majestic-12 Group were designated as follows:
Adm, Roscoe H. Hillenkoetter
ı Dr. Vannevar Bush
Secy, James V. Porrestal*
Gen, Nathan P. Twining
Gen. Hoyt S. Vandenberg
Dr. Detlev Bronk
Dr. Jerome Hunsaker
Mr, Sidney М. Souers
Мг. Gordon Gray
Dr. Donald Menzel
беп. Robert M. Montague
Dr. Lloyd V, Вегкпег
Тһе death of Secretary Forrestal on 22 Мау, 1949, created
а vacancy which remained unfilled until 01 August, 1950, upon
which date Gen. Walter B. Smith was designated as permanent
replacement.
TOP SECRET FMASIC
EYES OY! гүрс ОМУ MONI ae
deb 4-3
| TOP SECRET / MAJIC -
EXES..QNLY
* TOP SECRET *
Ф CETERE SEEE EEES]
EYES ONLY COPY ONE OP ONE.
On 24 June, 1947, а civilian pilot flying over the Cascade
Mountains іп the State of Washington observed nine flyinz
dise-shaped aircraft traveling in formation at а high rate
of speed. Although this was not the first known sighting
of such objects, 1% was the first to gain widespread attention
in the public media. Hundreds of reports of sightings of
similar objects followed. Many of these came from highly
credible military and civilian sources. These reports res-
ulted in independent efforts by several different elementa
of the military to ascertain the nature and purpose of these
objects іп the interests of national defense. А number of
witnesses were interviewed and there were several unsuccessful
attempts to utilize aircraft in efforts to pursue reported
disos in flight. Public reaction bordered on near hysteria
at times.
In spite of these efforts, little of substance was learned
е f | about the objecta until а local rancher reported that one
80 had crashed in а remote region of New Mexico located approx-
| imately seventy-five miles northwest of Roswell Army Air
Base (now Walker Field).
On 07 July, 1947, а secret operation was begun to assure
recovery of the wreckage of this object for scientific study.
During the course of this operation, aerial reconnaissance
discovered that four small human-like beings had apparently
' ejected from the craft at some point before it exploded.
These had fallen to earth about two miles east of the wreckage
site. All four were dead and badly decomposed due to action
by predators and exposure to the elements during the approx-
imately one week time period which had elapsed before their
discovery. А special scientific team took charge of removing
these bodies for study. (See Attachment "С".) The wreckage
of the craft was also removed to several different locations.
(See Attachment "B",) Civilian and military witnesses in
the area were debriefed, and news reporters were given the
effective cover story that the object had heen a misguided
weather research balloon.
сочена ае ÓEAEEEHE
* TOP SECRET *
SHAHN ER ¥ 4
eves oux ГОР SECRET / MAJIC
EYES ONLY -
10 / 340 18 / 570
T52-EXEMPT (E)
17 / 569
2-4
TOP SECRET / MAJIC. 004
EYES ONLY
«оссовасеаттеяя
% * TCP SECRET *
вот ия яз
EYES ONLY COPY ONE OP ONE.
А covert analytical effort organized by Gen. Twining and
Dr. Bush acting on the direct orders of the President, res-
ulted in a preliminary concensus (19 September, 1947) that
the disc was most likely а short range reconnaissance craft.
This conclusion was based for the most part on the craft's
size and the apparent lack of any identifiable provisioning.
(See Attachment "D".) А similar analysis of the four dead
occupants was arranged by Dr, Bronk. It was the tentative
conclusion of this group (20 November, 1947) that althourh
these creatures are human-like in appearance, the biological
and evolutionary processes responsible for their development
has anparently been quite different from those observed or
postulated in homo-snpiens. Dr. Bronk's team has suggested
the term "Extra-terrestrial Biological Entities", or "ENES",
he adopted as the standard term of reference for these
creatures until such time as a more definitive designation
can be agreed upon.
Since it is virtually certain that these craft do not origin-
ate in any country on earth, considerable speculation has
centered around what their point of origin might be and how
they get here. Mars was and remains a possibility, although
some scientists, most notably Dr. Menzel, consider it more
likely that we are dealing with beings from another solar
system entirely.
Numerous examples of what appear to be a form of writing
were found in the wreckage. Efforts to decipher these have
remained largely unsuccessful. (See Attachment "Е".)
Equally unsuccessful have been efforts to determine the
method of propulsion or the nature or method of transmission
of the power source involved. Research along these lines
has been complicated by the complete nbsence of identifiable
wings, propellers, jets, or other conventional methods of
propulsion and guidance, as well аз а total lack of metallic
wiring, vacuum tubes, or similar recognizable electronic
components. (See Attachment "Р".) It ін assumed that the
propulsion unit was completely destroyed by the explosion
which caused the crash.
К”) Wan... . h... ЕП
* TOP SECRET *
иона
ms шш TOP SECRET / MAJIC текте)
FYES ONLY
18 / 569 340 19 / 570
19 / 569
A-5
ТОР SECRET / М АЛС i 0 Û
EYES ONLY
* TOP SECRET *
ERHRRREHE HR
EYES ONLY COPY ONE OF ONE,
A need for as much additional information ав possible about
these craft, their performance characteristics and their
purpose Jed to the undertaking known ав U.S. Air Force Project
SIGN in Decemher, 1947. Іп order to preserve security, liason
between SIGN and Majestic-12 was limited to two individuals
within the Intelligence Division of Air Materiel Command whose
role was to pass along certain types of information through
channels. SIGN evolved into Project GRUDGE in December, 1948.
The operation is currently being conducted under the code name
BLUE BOOK, with liason maintained through the Air Force officer
who 18 head of the project.
Оп 06 December, 1950, а second object, probably of similar
oririn, impacted the earth at high speed in the Fl Тпа1о -
Guerrero area of the Texas - Mexican boder after following
a long trajectory through the atmosphere, By the time а
вевгсһ team arrived, what remained of the object had been almost
totally incinerated. Such material as could be recovered was
bar یا to the A.E.C. facility at Sandia, New Mexico, for
study.
Implications for the National Security are of continuing im-
portance in that the motives and ultimate intentions of these
visitors remain completely unknown. In addition, а significant
upsurge in the surveillance activity of these craft beginning
in May and continuing through the autumn of this year has caused
considerable concern that new developments.may be imminent.
It is for these reasons, us well ав the obvious international
and technolorical considerations and the ultimate need to
avoid а public panic at а11 costs, that the Majestic-1?2 Group
remains of the unanimous opinion that imposition of the
Strictest security precautions should continue without inter-
ruption into the new administration. At the same time, con-
tinvency plan MJ-1949-04P/78 (Top Secret - Eyes Only) should
he held in continued readiness should the need to make a
public announcement present itself. (See Attachment "С". )
Joe eee eee 2 es
TOP Sie MAJIC
EYES ON! Y T52-EXEMPT (E)
م -
EYES ONLY
12/340
9
20 /570
PB
TOP SECRET / MAJIC 006
EYES ONLY
> ТҮ ТТ ЛЫСЫ
* TOP SECRET *
нат-енккоа ааа а
COPY ONE OF ONE.
EYES ONIY
ENUMERATION OF ATTACHMENTS:
"ATTACHMENT "А"........ Special Classified Executive
Order #092447. (TS/EO)
*ATTACHMENT "В",...... «Орега% lon Ма jestic-12 Status
Report #1, Part A. 30" НОУ "47.
(TS-MAJIC/EO) ши
*ATTACHMENT "сн" CE E E оо 5 -Operation Ma jeati с-12 Status
Report #1, Part B. 30 NOV "47.
(TS-MAJIC/EO)
"ATTACHMENT "D",.......O0perntion Majestic-12 Preliminary
Ф ҒА. Analytical Report. 19 SEP |47,
| (TS-MAJIC/EO)
*ATTACHMENT "Е"........Орегабіоп Majestic-12 Blue Team
Report #5. 30 JUN '52.
(TS-MAJIC/EO)
*ATTACHMENT "P",,...,,,0peration Majestic-l2 Status
Report 42. 31 JAN '48.
(TS-MAJIC/EO)
"ATTACHMENT "G"........Operation Majestic-12 Contingency
Plan MJ-1949-04P/78: 21 JAN '49,
(TS-MAJIC/EO)
"ATTACHMENT "Н",.......Орегабіоп Majestíc-12, Maps and
Photographs Polio (Extractions).
(TS-MAJIC/EO)
HAASEZILIINENET!
EYES ONLY YES ONLY 752-ЕХЕМРТ (E).
20 / 569 21/570
E)
4;
ди
217569
TOP SECRET
EYES ONLY
THE WHITE HOUSE
WASHINGTON
September 24, 1947.
MEMORANDUM FOR THE SECRETARY OF DEFENSE
Dear Secretary Forrestal:
Ав per our recent conversation on this matter,
you are hereby authorized to proceed with all due
Speed and caution upon your undertaking. Hereafter
this matter shall be referred to only as Operation
Majestic Twelve.
It continues to be my feeling that any future
considerations relative to the ultimate disposition
of this matter should rest solely with the Office
of the President following appropriate discussions
with yourself, Dr. Bush and the Director of Central
Intelligence,
TOP SECRET
EVES UNLY
14 / 340
10%
„ч
---
ем
`...
-^
P
22/570
Өз
/ 569
Roscoe H. Hillenkoetter
Roscoe Henry Hillenkoetter was the third
director of the post-World War II United
States Central Intelligence Group, the
third Director of Central Intelligence, and
the first director of the Central
Intelligence Agency created by the
National Security Act of 1947. He served
as DCI and director of the CIG and the CIA from May 1, 1947, to
October 7, 1950, and, after his retirement from the United States
Navy, was a member of the board of governors of National
Investigations Committee On Aerial Phenomena from 1957 to
1962. Wikipedia
Born: Roscoe Henry Hillenkoetter, May 8, 1897, St. Louis,
Missouri, U.S.
Died- June 18, 1982, New York City, New York, U.S.
Spouse(s): Jane Clark
Education: United States Naval Academy
President: Harry Truman
Deputy: Edwin К. Wright
Preceded by: Hoyt Vandenberg
Succeeded by: Walter B. Smith
15 / 340
James Forrestal
James Vincent Forrestal was the last
Cabinet-level United States Secretary of
the Navy and the first United States
Secretary of Defense. Forrestal came
from a very strict middle-class Irish
Catholic family. He was a successful
financier on Wall Street before becoming
Undersecretary of the Navy in 1940, shortly before the United
States entered the Second World War. He became Secretary of
the Navy in May 1944 upon the death of his superior, Frank
Knox. President Franklin D. Roosevelt requested that Forrestal
take the lead in building up the Navy. In 1947, after the end of
the war, President Harry S. Truman appointed him the first
secretary of the newly created Department of Defense.
Forrestal was intensely hostile to the Soviet Union, fearing
Communist expansion in Europe and the Middle
East. Wikipedia
Born: James Vincent Forrestal, February 15, 1892, Matteawan,
New York, U.S. (now Beacon)
Died: May 22, 1949, Bethesda, Maryland, U.S.
Political party: none
Children: 2, including Michael
Education: Dartmouth College, Princeton University
President: Harry S. Truman
Preceded by: Position established
Succeeded Бу: Louis A. Johnson
Dr. Vannevar Bush.
24/5
Dwight D. Eisenhower
Dwight David "Ike* Eisenhower was an American
military officer and statesman who served as the
34th president of the United States from 1953 to
1961. During World War Il, he served as Supreme
Commander of the Allied Expeditionary Force in
Europe and achieved the five-star rank of General of
the Army. He planned and supervised the invasion of
North Africa in Operation Torch in 1942—1943 as well
as the invasion of Normandy from the Western Front in
1944—1945. Eisenhower was born into a large family of mostly
Pennsylvania Dutch ancestry in Denison, Texas, and raised in
Abilene, Kansas. His family had a strong religious background,
and his mother became a Jehovah's Witness. Eisenhower,
however, belonged to no organized church until 1952. He
graduated from West Point in 1915 and later married Mamie
Doud, with whom he had two sons. During World War |, he was
denied a request to serve in Europe and instead commanded а
unit that trained tank crews. Wikipedia
Born: David Dwight Eisenhower, October 14, 1890, Denison,
Texas, U.S.
Died: March 28, 1969, Washington, D.C, U.S.
Resting place: Dwight D. Eisenhower Presidential Library,
Museum and Boyhood Home
Political party: Republican (1952-1969)
Children: Doud, John
Parents: David Jacob Eisenhower, Ida Stover
Relatives: Family of Dwight D. Eisenhower
Education: United States Military Academy (BS)
Occupation: Military officer, politician
569
E Y k —
Harry S Truman
Harry S. Truman was the 33rd president of the United States
from 1945 to 1953, succeeding upon the death of Franklin D.
Roosevelt after serving as vice president. He implemented the
Marshall Plan to rebuild the economy of Western Europe, and
established the Truman Doctrine and NATO. Truman grew up in
Independence, Missouri, and during World War | was sent to
France as a captain in the Field Artillery. Returning home, he
opened a haberdashery in Kansas City, Missouri and was later
elected as a Jackson County official in 1922. Truman was
elected to the United States Senate from Missouri in 1934 and
gained national prominence as chairman of the Truman
Committee aimed at reducing waste and inefficiency in wartime
contracts. Soon after succeeding to the presidency he
authorized the first and only use of nuclear weapons in war.
Truman's administration engaged in an internationalist foreign
policy and renounced isolationism. Wikipedia
16 / 340
93 / 569
82 / 340 94 / 570
Cy ^ - í
ә.
y
— С =
ЛА
0
|
“4.
ip
ut
RUE >
аа
THE MJ-12 MANUAL
20 / 340
61 / 569
Dess
Intact, Operation: iinic
л, OPerational, or Scmi- intact айста[| of Exiraieriesi; al d
| Алу Mechanical or electronic dey ке or Machine whi
functional.
|
| Апу Mechanical or electronic dey ісе or machine wh;
| mostlv Complete
I
| Devices
|
Of non-electronic
Personal belongings, Organic ingestibles, ete.
Ch appears i be un
ch appears to
Living non-human Organisms in apparent 800d or reasonable health.
Deceased non-human organisms OF Portions of organisms. organic
Other suspect organic matier,
UNE and тапи ture,
damaged ang
l 102-4 Mea $1 $$
ID. 301 Í Arca 515;
251 $4
|
| PD-40-8G | Area 51 «4
|
4 ІҒ.|01-қ | Arca 51 $4
remains and
Printed matter, electronic recordings, maps, chars, Photographs and film
portion of a device thought to be offensive ог defensive weaponry,
. š ; ; 1 à ; wal of OPNA
VY CYCY ette iil iion pe arim 9f OPNA pr,
51 / 340
|
|
| UF-10.M | Arca 51 5.4
|
| 52-331 | Ве Lab WP.61
Ei]
| EBE.010 | OPNAC BBS.51
ЕВЕ-ХО | Вос Lab WP.61
| MM-54A | Building 21 КВН
| WW-010 | Ака $1 S4
|
|
Cpersonnel |
— nem.
<
=
7
o
РА
t
ж
62 / 570
AREA 51 IN NEVADA | | noc d
South Pabiro
Range.
Wilderness
I^
Badger
Mountain
w.
Area 20 Areo 19 ie
Area 15 -N и,
Area ©
| Grapevine Area 17
Mountains
Wilderness
Study Area : Area 18
Electronic
Combat
Systems
(ECS)
Area 16
Nevada :
National Desért— —
| -— — Lake. —
Security в ——
Grapevine š
Mountains Area 29 Site —
LOAD LOCATION SELECTED LOCATION (7) MAP COORDINATES (7) CURSOR COORDINATES?)
AREA 51IN NEVADA LATITUDE: 37° 15' 47.0016" LATITUDE: N 37° 14 24.6069"
LNG: LONGITUDE: -115° 47 34.872" LONGITUDE W 115° 48' 22.3295"
LATITUDE: М 377157834 LATITUDE: М 37° 14.410116
LATITUDE: 37.263056 LONGITUDE: W 115° 47.5812 LONGITUDE W 115° 048.372158'
LONGITUDE: -115.79302 LATITUDE: ; LATITUDE:
LONGITUDE: - LONGITUDE:
eee? m
— AC ІС ағат г
А | 2] qi | P^ уу! |
= | = = У. L | VINU Vi A... ...- .- |
>( \ NN ТЕ
E 30V ER 1А. М =)
2/569 3/570
So what are Extraterrestrials doing here?
—Here you get a short text summary:
They fill the tanks with compressed liquid air and fresh water, dump
the contents of the sewage tank into our waterways and lakes, they
telepathically influence decisions made within Authorities and
Governments. They steal containers that contain everything from
girls' make-up to video game consoles. They conduct biological
experiments, and they have actively supported the idea of war in
Ukraine.
Now is the time to shoot them down. We dont have to put up with the
above no more.
г тт — - v
. k
ще и -
—— " = -
(4 CHINESE SPY BALLOON
D >
`
—
4“ Е
-
gc:
>£
y ICBM SILO FIELD aai
—
U.S. OFFICIA Ls МАЗ BALLOON SOUGHT COMMUNICATIONS.
m.
32 / 570
32 / 569
The Soviet Union: 4 October 1957 - The first rocket-launched satellite
was placed into an elliptical low Earth orbit from Baikonur
Cosmodrome. Sputnik 1 circled the Earth every 96 minutes, and its
simple radio signal was heard by scientists and radio operators
across the world.
=
22 / 340
33 / 570
Critics say the following MJ12 manual is not real because, in it, they tell about satellites, already in 1954, (or actually in 1957, when the last note or
change was made in this M]12 manual).
— Well, they had balloon satellites.
--Апа they were fully aware that even the moon above аге a satellite.
--Тһеу write a field manual about UFO's, so of course they know what a satellite is.
—If one can fly to here from another Solar System, that one can also have satellites, above us.
—THE MANUAL IS LEGIT. IT'S REAL U.S. GOVERNMENT PROPERTY.
—They don't nail all of their alien descriptions 100% correct in this 1950's manual, though.
—Some of the text are based on qualified guesses and they had a really hard time to put this manual together at all. The Aliens didn't want it to exist.
E
30 / 569 21 / 340 317570
300190]
| TO 1201—3—11—1
MAJESTIC—12 GROUP SPECIAL OPERATIONS MANUAL
— '———————Ó——
EXTRATERRESTRIAL
ENTITIES AND TECHNOLOGY.,
RECOVERY AND DISPOSAL
TOP SECRET /MAJIC
EVES ONLY
WARNING! This is a ТОР SECRET--MAJIC EYES
ONLY document containing compartmentalized
information essential to the national seeurity of
the United States. EYES ONLY ACCESS to the
material herein is strictly limited to personnel
possessing МАЛС--12 CLEARANCE LEVEL.
Examination or use by unauthorized personnel is
strictly forbidden and is punishable by federal
ам
MAJESTIC—12 GROUP ' APRIL 1954
ма) з 4а” ^4
33 / 569 23 / 340 34 / 570
34 / 569
TOP SECEET / MAJIC
КА BRNO | CIR MEPLRODMIENT OF в
SLD жаз PELE ниша WATT Sh
EPS PEL CFVIUESA дай) WILL BE PELLG
MECUFAUS, ET FIR EI МОТ АРУГА.
Бо С 1 U И с ТЫЙ
г. г--<--+-<«<+ч4--4-
29, PON s: x
<< Z f1 OBI л xo _
A 0: Gag IIR 62 а РА Tedd Ee SS ut Яв
š š 29%
А EO? лунур арти чисман е cd
1
j
i те. — луды» “е сетри
IONE. OAL
Т ¿E EOE
%
RISO CER — з ED EL AASARIN PIE
P SECRET / MAJIC
реклстноя IN Азу FORM 18 PORSEL
24 / 340
35 / 570
КРАТКО ғә» +
НДИ TEX ЗЕЕ бк Ma e
EENI TEJ 20903720
“er i : a » . еге
т AM +” ^ к f ntm va
i
35 / 569 25 / 340 36 / 570
36 / 569
TOP SECRET / MAJIC EYES ONLY
SOM 1— 01
pecial Operations Manual MAJESTIC — 12 GROUP
1-01 Washington 25, D. C., 7 April 1954
EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY,
RECOVERY AND DISPOSAL
„№ Guarneri. OPERATION MAJESTIC- —12 Paragraphe Page
| | C section 1. Project purpose and воав. 1. PE 2
E C uariga 2 INTRODUCTION
Е Section Г. General... nsu I 6,7 4
у Il. Definition and даба. а тес EP 8-11 4
Ë Civan. RECOVERY OPERATIONS
EE Section lL Security. 7:55: ЕУ 12,13 8
Š П. Technology гесоуегу. LL. 14-19 9
БҮ Снликк 4. RECEIVING AND HANDLING
„я Section 1. Handling upon receipt of material ............. 20 15
| Па CHAPIER 5. EXTRATERRESTRIAL BIOLOGICAL
14% ENTITIES
Lo th Section I. Living organisms............. cse eere cssc 21-24 17
E Il. Non-living organisms a 25,26 18
ОП Cirer 6 GUIDE TO СЕО IDENTIFIC ATION
VE Section Г. ОРОВ guide. РА y US и I Ton 21-29 21
nel у 11. Identification бена. ИСА С ДАЛ 30-35 22
: HI. Possible origins nuu. 36.37 26
! W.W Appendix I., REFERENCES дусы о а ық 28
ppendix [a. FORMS... BOUE HEUS Dee t 29
Appendix H. MAJIC- 196 ROU p PERSONNEL. EET REN Em ivt 30
PHOTOGRAPHS ДАВАЩА ЕО Се Пе 0 NEE ‚== 31
ppendix ITI
SECRET MAJIC EYES ONLY
26 / 340
37 / 570
SECRET
ГОР MAJIC EYES ONLY
CHAPTER 1
OPERATION MAJESTIC—12
— —ÀÓ— t — HÀ
Section |І. PROJECT PURPOSE AND GOALS
dc Ue o Қа i ine и
Scope
Fhis manual has been prepared especially for Majestic—12 units. Its pur
jose is 10 present all aspects of Majestic—12 во authorized personnel will
ı better understanding of the goals of the Group, be able to more
/ рана Пу deal with Unidentified Flying Objects, Extraterrestrial Technology
| L Y nd Entities, and increase the efficiency of future operations
General
725
I mm
SES
4 MJ--12 takes the subject of UFOBs, Extraterrestrial Technology, and
RET -MAJIC Е) Dxtraterresteial Biological Entities very seriously and considers the entire
отраг т еп а] сс to be a matter of the very highest national security. For that reason
. | securi "o tina relating to the subject has been assigned the very highest secu-
ational `' си rity ity classification. Three main points will be covered in this section.
LY ACCESS to i ‚ The general aspects of MJ—19 to clear up any misconceptions that.
а ед то person nyone may de ў қ
pepe ww © Ihe importance of the operations,
ARANCE 1, E VE c The need for absolute secrecy in all phases of operation
rized per son nej
e by federal law. Security Classification
\ll information relating to MJ—12 has been classified MAJIC EYES
this documenf ONLY and carries a security level 2 points above that of Top Secret. The
Eeen lor this has to do with the consequences that may arise not only from
he impact upon the publie should the existence of such matters become gen-
е MJ— 12 С®В@ га! knowledge, but also the danger of having such advanced technology as
ny б Bas been recovered by the Air Force fall into the hands of unfriendly foreign
` Powers. No information is released to the public press and the official gov-
anscribed r otes тотеп: position is that no special group such as MJ-—12 exists
— 20085
` + |
persons requg
duction 1n
В History of the Group
peration Majestic--12 was established by special elassified presidential
rder оп 24 September 1947 at the recommendation of Secretary of Defense
imes V. Forrestal and Ог. Vannevar Bush, Chairman of the Joint
Research and Development Board Operations are carried out under а Top
pecret Research and Development . Intelligence Group directly responsible
ply to the President of the United States. The goals of the MJ-—12 Group
(1-12 аники 2
TOP SECRET / MAJIC EYES ONLY
[ION IN ANY FORM IS FORBIDDEN HY FEDERAL LAW
37 / 569 27 / 340
38 / 570
TOP SECRET / MAJIC EYES ONLY
are as follows
Ihe recovery for scientific study of all materials and devices of a for-
eign or extraterrestrial manufacture that may become available. Such
maternal and devices will be recovered by any and all means deemed neces-
sary Бе the Group.
^. The recovery for scientific study of all entities and remains of entities
not of terrestrial origin which may become available through independent
SE action by those entities or by misfortune or military action.
lhe establishment and administration of Special Teams to accomplish
іле above operations
|
A J | e d. The establishment and administration of special secure facilities
E located at secret locations within the continental borders of the United
B crues for the receiving, processing, analysis, and scientific study of any and
all material and entities classified as being of extraterrestrial origin by the
Group or the Special Teams.
Establishment and administration of covert operations to be carried out
B® concert with Central Intelligence to effect the recovery for the United
JIC EYE States of extraterrestrial technology and entities which may come down
: inside the territory of or fall into the possession of foreign powers.
ental 1288 г ‘The establishment and maintenance of absolute top secrecy concerning
беп гу ай the above operations.
за [o t ы
n 5. Current Situation
) 1
LEVE It ıs considered as far аз the current situation is concerned, that there are
Hew indications that these objects and their builders pose a direct threat to
ипе не security of the United States, despite the uncertainty as to their ulti-
w. nate motives in coming here. Certainly the technology possessed by these
beings far surpasses anything known to modern science, yet their presence
Bere seems to be benign, and they seem to be avoiding contact with our
peces, at least for the present. Several dead entities have been recovered
ішіг ріопу with а substantial amount of wreckage and devices from downed craft,
v m of which are now under study at various locations, No attempt has been
мы made by extraterrestrial entities either to contact authorities or to recover
heir dead counterparts or the downed craft, even though one of the crashes
Moon result of direct military action. The greatest threat at this time
irises тип the acquisition and study of such advanced technology by foreign
powers untnendly to the United States It is for this reason that the recov.
ery and study of this type of material by the United States has been given
h a high priority
Кп }
` 4 4АЗАН 3
ГОР SECRET / MAJIC EYES ONLY
(UN IN ANY FORM IS FVORBIDONRN НУ FEDERAL LAW
(
39 / 570
28 / 340
38 / 569
TOP SECRET / MAJIC EYES ONLY
CHAPTER 2
Ў INTRODUCTION и
Ld 2
38 УА
Т Section 1. GENERAL Е
3
E. Scope
s operations manual is published for the information and guidance
"ned information on determination, documentation um
nd 4 of debris devices, craft, and occupants of such — 5:
s defined as Extraterrestrial Technology or Extraterrestrial Biological
ERE: in Section П of this chapter.
cond: Та contain z list of current references, including technical
: and other available publications аррісаМе to these operations.
peor И contains а list of personnel who comprise the Majestie-12
Section в. DEFINITION AND DATA
POR, . Suh — appear as one of several shapes and
n» aod а Кв extraordinary биім characterisation,
Меса жай decom of ankapaq era or быти,
enone or of materials at соблазна with oreet technology
won
ж; А әлде of кеу «атай theught һө af тайганы
мега Sah wap marie r =
Маже» that едва. conned wr «мет, d -
2 o lor sect дачадан ін demanstrably different frum dian
2.23 oor deerved оз bomo вре, :
EN 2 ORME
ТОР SECRET / MAJIC EYES ONLY я
£4 PWeoes тыға 2% „фый ай
39 / 569 29 / 340 40 / 570
TOP SECRET / MAJIC EYES ONLY
9. Description of Craft
Documented extraterrestrial craft ( UFOBs ) are classified in one of four
categories based on general shape, as follows:
a. Elliptical, or disc shape. This type of craft is of a metallic construction
and dull aluminum in color. They have the appearance of two pie-pans or
ishallow dishes pressed together and may have a raised dome on the top or
bottom. No seams or joints are visible on the surface, giving the impression
bf one-piece construction. Discs are estimated from 50-300 feet in diameter
and the thickness is approximately 15 per cent of the diameter, not includ-
ng the dome, which is 30 per cent of the disc diameter and extends another
1-6 feet above the main body of the dise. The dome may or may not include
windows or ports, and ports are present around the lower rim of the disc in
bome instances. Most disc-shaped craft are equipped with lights on the top
hnd bottom, and also around the rim. These lights are not visible when the
raft is at rest or not functioning. There are generally no visible antenna or
projections. Landing gear consists of three extendible legs ending in circular
nding pads. When fully extended this landing gear supports the main
body 2-3 feet above the surface at the lowest point, А rectangular hatch is
ocated along the equator or on the lower surface of the disc.
b. Fuselage or cigar shape. Documented reports of this type of craft are
xtremely rare. Air Force radar reports indicate they are approximately 2
housand feet long and 95 feet thick, and apparently they do not operate in
he lower atmosphere. Very little information is available on the perfor-
ance of these craft, but radar reports have indicated speeds in excess of
,000 miles per hour. They do not appear to engage in the violent and
rratic maneuvers associated with the smaller types,
> Quaid or circular shape. This type of craft is described as being shaped
те an ice cream cone, being rounded at the large end and tapering to a
ear-point at the other end. They аге approximately 30-40 feet long and the
ick end diameter is approximately 20 per cent of the length. There is an
ktremely bright light at the pointed end, and this craft usually travels
iint down. They can appear to be any shape from round to cylindrical,
lepending upon the angle of observation. Often sightings of this type of
Годой are elliptical craft seen at an inclined angle or edge-on.
ў 1. Airfoil or triangular shape. This craft is believed to be new technology
e ТІЛ!” rarity and гесепсу of the observations. Radar indicates an isosce-
* triangle profile, the longest side being nearly 300 feet in length. Little is
nown about the performance of these craft due to the rarity of good sight-
igs, but they are believed capable of high speeds and abrupt maneuvers
imlar to or exceeding the performance attributed to types "a" and *e".
ч.
| MAJIC
CRET-MÁJIC EY
compartmentalig
national security
NLY ACCESS to
imited to personj
EARANCE LEVE
Cab person n ef
bral law.
"PETIT 5
TOP SECRET / MAJIC EYES ONLY
AN нм i
40 / 569 30 / 340 41 / 570
TOP SECRET / MAJIC EYES ONLY
10. Description of Extraterrestrial Biological Entities ( EBEs )
Examination of remains recovered from wrerkage of UFOBs indicates that
Extraterrestrial Biological Entities may be classified into two disti E
ories as follows nct
а ЕВЕ Type 1 These entities are humanoid and might be mistaken for
3 uman beings of the Oriental race if seen from a distance. They are bi-
dal, 5-5 feet 4 inches in height and weigh 80-100 pounds. Proportionally
hev are similar to humans, although the cranium is somewhat larger and
ізге rounded. The skin is a pale, chalky-yellow in color, thick, and slightly
SE -bled in appearance. The eyes are small, wide-set, almond-shaped, with
M А J | RB rownish-black irises with very large pupils. The whites of the eyes are not
| ite that of humans, but have а pale gray cast. The ears аге small and set
SR on the skull. The nose is thin and long, and the mouth is wider than in
1 umans, and nearly lipless, There is no apparent facial hair and very little
\ LY body hair, that being very fine and confined to the underarm and the groin
rea. The body is thin and without apparent body fat, but the muscles are
ell-developed. The hands are small, with four long digits but по opposable
*RET—M IC В пить. The outside digit is jointed in a manner as to be nearly opposable,
4 ii АЩ... there is no webbing between the fingers as in humans. The legs are
:ompartmenta li lightly but noticeably bowed, and the feet are somewhat splayed and pro-
onal securit J Dortionally large.
EBE Туре П. These entities are humanoid but differ from Type I in
many respects. They are bi-pedal, 3 feet 5 inches - 4 feet 2 inches in height
тией to регзод 1 weigh 25-50 pounds, Proportionally, the head is much larger than
mans or Type I EBEs, the cranium being much larger and elongated. The
yes are very large, slanted, and nearly wrap around the side of the skull.
hev are black with no whites showing. There is no noticeable brow ridge,
nd the skull has a slight peak that runs over the crown. The nose consists
f two small slits which sit high above the slit-like mouth. There are по
xternal ears The skin is a pale bluish-gray color, being somewhat darker
bn the back of the creature, and is very smooth and fine-celled. There is no
hair on either the face or the body, and these creatures do not appear to be
hammalian. The arms are long in proportion to the legs, and the hands
ге three long. tapering fingers and a thumb which is nearly as long as the
neers. The second finger is thicker than the others, but not as long as the
ndex finger. The feet аге small and narrow, and four toes are joined
zether with a membrane
it is not definitely known where either type of creature originates, but it
sems certain that they did not evolve on earth. It is further evident,
although not certain, that they may have originated on two different plan-
‘ty ACCESS 104
„12 GRAB 6
TOP SECRET / MAJIC EYES ONLY
REPRODUCTION IN ANY FORM 15 FORRIDDEN RY FEDERAL LAW
41 / 569 31/340 42 / 570
42 / 569 32 / 340 43 / 570
ГОР SECRET MAJIC EYES ONLY
11 Description of Extraterrestrial Technology
| lowing information is from preliminary analysis reports of wreck
o collovced from. crash sites of extraterrestrial craft. 1947 1953, excerpts
‘ which are quoted verbatim to provide guidance as to the type and char
Sof material that might be encountered in future recovery opera
| analysis of the debris from the crash site seems to indicate that
the debris is that of an extraterrestrial craft which exploded from within
4 came into contact with the ground with great force, completely destroy-
the craft The volume of matter indicates that the craft was арргохі-
nately the size of a medium аихтай, although the weight of the debris indi-
os that the craft was extremely light for its size.
Metallurgical analysis of the bulk of the debris recovered indicates that
he samples are not composed of any materials currently known to Terres-
rial science
pote WS Sat et e Ob Wig ee ee
o0 The material tested possesses great st rength and resistance to heat in
iproportion fo its weight and size, being stronger by far than any materials
" NET military or civilian aircraft at present.
Much of the material, having the appearance of aluminum foil or alu-
unumeomagnesium sheeting, displays none of the characteristics of either
гора | resembling instead some kind of unknown plastic-like material.
Solid structures and substantial beams having a distinct similarity in
ppearance to very dense grain-free wood, was very light in weight and pos-
: tensile and compression strength not obtainable by any means known
y modern industry
’ None of the material tested displayed measurable magnetic characteris-
ics or residual radiation,
go Several samples were engraved or embossed with marks and patterns.
hese patterns were not readily identifiable and attempts to decipher their
сапти has been largely unsuccessful,
во Examination of several apparent mechanical devices, gears, etc.
vealed little or nothing of their functions or methods of manufacture.
43 / 569 33 / 340 44 / 570
ГОР SECRET / MAJIC EYES ONLY
CHAPTER 3
у
v К
rini Una; ی
жазады
RECOVERY OPERATIONS
иди
1 Section |. SECURITY
1 2. Press Blackout
j
T/ МАЧ
(5
xt1
га!
reat cure must be taken to preserve the security of any location where
raterrestrial Technology might be retrievable for scientific study.
je measures must be taken to protect and preserve any material or
ШЕ." from discovery, examination, or removal by civilian agencies or individ-
SE. of the general public. It is therefore recommended that a total press
0 М LY ЖЕР: be initiated whenever possible. If this course of action should not
BE rove feasible, the following cover stories are suggested for release to the
ress. The officer in charge will act quickly to select the cover story that
“ЕСЕЕТ--МАУІС БҰШ. fits the situation. It should be remembered when selecting a cover
SEC же в tory that official policy regarding UFOBs is that they do not exist
ig co mpartmen > 13 " Осии Denial. "The most desirable response would be that nothing
e nation al securit ИДрпизиа! has occurred. Dy stating that the government has no knowledge of
ILY ACCE SS to Wahe event, further investigation by the public press may be forestalled.
ON "i * Diseredit Witnesses. If at all possible, witnesses will he held incommu-
limited to perso d hieado until the extent of their knowledge and involvement can be deter-
EARANCE L ЕУ fined. Witnesses will be discouraged from talking about what they have
horized регзоппе есп. and intimidation may be necessary to ensure their cooperation, If wit.
‘ peces have already contacted the press, it will be necessary to discredit
federal la ь eir stories. This can best be done by the assertion that they have either
il icinterpreted natural events, are the victims of hysteria or hallucinations,
br are the perpetrators of hoaxes,
с. Deceptive Statements. И may become necessary to issue false state.
hents to preserve the sccurity of the site. Meteors, downed satellites,
eather balloons, and military aireraft are all acceptable alternatives,
although in the case of the downed military aircraft statement care should
be exercised not to suggest that the aircraft might be experimental or secret,
s this might arouse more curiosity of both the American and the foreign
press. Statements issued concerning contamination of the area due to toxic
ppills from trucks or railroad tankers can also serve to keep unauthorized or
ndesirahle personnel away from the area.
1
`
ишеп Ж
3. Secure the Area
The area must be secured as rapidly as possible to keep unauthorized per-
onnel from infiltrating the site. The officer in charge will set up a perime-
and establish a command post inside the perimeter. Personnel allowed
E MJ—12 46355 8
TOP SECRET / MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN ву FEDERAL LAW
45 / 570
44 / 569 34 / 340 /
€ Т
T / MAJ |
МУ |
СОНЕТ МАЛО
compurtinenta
гони! coun
i8 d
пей to регей
ANCE LES
HE
AGG]
uthorized pet
able by federal Ia
өш this docum ng:
ed. person rej ij
n the MJ 12 GRE
production ІН ТТ,
tranzeribed not
45 / 569
CHE / MAJIC EYES ONLY
с will he көңі ін the ее ве нии heceenary (ә) prepare tae
міс frr ағатын, and will тәнім of Miltary Бекатит Fore
ties may ім pressm] uito service на {raffle and emm epa
arumsbaness will Weal тила в or law новиот perepnel be
Графа (he perineter and al] nécspenry preenulions ит я be taken
ra Пай they do not interfere with the peu Al loti
Perimeter Ht ia Дези е that onffieient military тентегі be utilized
з perimeter nnd the site Inrye enaugh to kawg both unauthü
ronnie) and (e perimeter personnel from seeing the site Onas the
аі, regular patrols will he set up along the perlinelar U) anaua
чину, und electron вирее Шале will be utilized to augment the
Perimeter persninel will be equipped with hand communication
Рори} working at the
Ho илаш personnel will be allowed into Цин
ҮТИ ЛИП
ТЕТ петия with ye nmmutition
Ie wil carry doarma
ieu
ие Post. Ideally, the enimand ме should be as close to the
be ve is ре еи to efficiently coordinate operations. As soot ae the wan
(pod ie operakinnal, алиа with the Маје м 17 Group Will be satah
$
Г, Г,
гі аі vis naire LAMINAR Anaha
The site nnd the surrounding aren will he cleared of all
минное personnel, Witnesses will be debriefed and detained far fur
pa ernninalion by МР. Under no elreumstanees will wilnesses he
leased fram custody until thelr stories have been evaluated hy Md 12 and
nPyrt veu ueni
ey have been tharoughly debriefed
A preliminary evaluation of the situation will be
pleted and в preliminary report prepared The М4--12 Croup will then
Б рри е оп the situation nt the earliest роза а Opportunity Тһе М4--12
12 RED
do utualiun Elouluütiohn
youp will Tied) take в deborminabion as 16 whether or not М4
AM at ОРНАС Team will he Феран Бей Lo the area
Section ll. TECHNOLOGY RECOVERY
Hemoval and Transport
Ах soon as commublealion 18 established, removal and transport of all
botenel will commence under orders from М4-12
а Documentation, If the situation permits, care should be taken to doeu
ent the area with photographs before anything is moved. ‘The area will be
ич Кей for radiation and other toxie agents И the area cannot be kept
(ure for an extended period of time, all material must be packed and
ansported as quickly as possible to the nearest secüre military facility.
Пиз will he seeomplished by covered transport using litthetraveled roads
herever possible
b. Complete or Functional Craft, Craft are to be approached with extreme
nution if they appear functional, as serious injury may result from exposure
! ра AB3HH 9
TOP SECRET / MAJIC EYES ONLY
HEPHODUCPTIIKIN EN ANY FORM IA FORBIDDEN BY FEDERAL LAW
35 / 340
46 / 569
TOP SECRET / MAJIC EYES ONLY
поп and vieetrial discharges И the стай із functioning. bet
" ke ri rt
RED TEAM personnel wearing protective cthing. Any device that
го be functioning should also be left to М2--1% RED TEAM disposal.
(е стай and рама of crafts too large to be transported by covered
be disassembled, if this сап be accomplished easily and
hey must be transported whole, or on open flathed trailers, they
be covered in such a manner as to camouflage their shape.
Extraterrestrial Biological Entities EBEs must be removed to а top
ç Шу 35 quickiy as possible, Great care should be taken to pre-
ossible contamination by alien biological agents. Dead EBEs should
кей їп ке at the earliest opportunity ta preserve tissues. Should live
be encountered, they should he taken ints custody and removed to a
ecurity facility by ambulance. Every effort should be taken to ensure
ВЕ ғ survival. Personnel involvement with EBEs alive or dead must
pt to an absolute minimum. ( See Chapter 5 for more detailed informa-
dealing with ЕВҒа )
wii
Tf +h
ас:
5. Cleansing the Area
nce all material has been removed from the secured site, the immediate
1 will be thoroughly inspected to make sure that all traces of Extrater-
trial Technology have been removed, In the case of a crash, the sur-
nding area will be thoroughly gone over several times to ensure that
thing has been overlooked. The search area involved may vary according
юса! conditions, at the discretion of the officer in charge. When the offi-
n charge is satisfied that no further evidence of the event remains at the
it may be evacuated.
Special or Unusual Conditions
held in readiness should the need to make a publie disclosure become nee-
"n
36 / 340
о be abandoned, 4 may be approached only by specisily trained `
lan МЈ.1949.04Р / 78 ( TOP SECRET - EYES ONLY ) should |
47 / 570
E “2 uosid OVNdO Jo poate игри vorrmoss joy u POUIDIUDD 2q ти ето пат,
| |
FS IS еу |. GEAN | “Atuodeam auisuajop зо PNSUNJO 24 O! 1{йпонд аздар ғ jo 001008 0 301420 ішу sode | gy
SPAY 12 Sumimg | YECWIN Í WIG pue sudeiSotogd ‘Sueyo «деш ‘Яир Huan эур panud “"рәрұ | DI
1
| | Joneu эше 0 зәј Jame "Aia |
19-4№ qe ong | ЕРЕН PU? suigtai ше? '"SUISTUPSID Jo Suomiod jo Stusiup3;o uewny-vou Рәѕғәэҳт Зшлиниом | 6
10-599 ONO | 010-299 | WEY 2192005221 Jo poog Tartddg ui <шешею urtung-uou 3uiar] РЕЛІ Fury | 8
| |
ТУАМ qe ong | пече | Furioj se Pns aneu шоддпе p JO звизеш 210123] 2-50и jo Го ецоәш-шоқ pue Saitddag | L
! | Зо бизретецо Свормоедха 10 |ensnun Ч цэм pur &3ojoug»» "Siuou v; |
PS 1$ tay | W-£01-40 | PUP 2909198 шә O1 имоих jou S[EU»]E 10 Sluəuuəjəa jo P»soduos
FS I$ саду | N-E0€-dg
|
| | oP па чшивзизеш unurtunje гәч “&ñoJjouuaə, PUP 2512125 “SHUT ат
FS IS ray i y. ГОГ | waun or U^OUY se рәутиЗоләу Apisto sipipun 10 из jo равофшоз $112 ще. pəunuəpi | ç
f j г |
ROS | Slaved put ѕәоләр |onuoə Рәјеіэоѕҳь i
t-S Iç ғәр | Оғоғ-аа | pue әп} “уур uoimsindosd 21015500 are yiya SIUSQGP1] Jo SUNE pup АЗ | lup|d:5əwoq | r
| | . . !
| Зо 5рзош | "Onop |
[
|
ing Равешер 29 С] Siradds Әлім әшцоеш JO әлләр 2140112513 Jo Рома Ану
|
Teuonunj |
HM ошузеш Jo PAIP шору Jo Ка |
ке кү v7 vn БЫНЫ иш ?UP US < S ae | Seta E ДЕ | p ix Б
i pur uñisap ІР мәнән HO YUNE гі ішек 10 *Iponmiago nuy | |
Е L Hiuk Опо ча | Yenny |і
US Iç tary 1 ОР | pue РәЗешерип Жо; uesddeg U
SW aoo, - t
- Mmm |
11
©
A
E
т
29
RI
/ MAJIC EYES ONLY
RET
TOP SEC
Hy FEDERAL? au
ОКМ 18 VORRIDDEK N
IN ANY p
REPROD TION
48 / 570
37 / 340
47 / 569
ГОР SECRET MAJIC EYES ONLY
“RET MAJTE Eyka ONLY
Нате уты, TECHNOL беге қасы
OT Fee А
SECRET MAJ] i
в сотраг! тедра
e national Secur ; |
INLY ACCESS M | a
limited to persi ы
EARANCE LE
horized Persons i |
т
е by federa] lag
this docu meni
4;
reque
I-12 GER
persons
SECRET; MAJIC КУБУ ONLY
— MÀ ———._...
—=ЗЭЗ+За..
SOM 01.2
Figure 2. MJ Form 1--007
Packaging and Packing Data
а. Domestic Shipment Individual items are
) oisture-vaporproof harrier and heat sealed. The
"rated fiberboard box. The voids within the
tagged and wrapped in a
y are then placed in a cor-
box are packed thoroughly
13
SECRET / MAJIC
| N IN AD
EYES ONLY
VY FORM qs FOHHIDDEN HY FEDERAI LAW
38 / 340
48 / 569
49 / 570
49 / 569
ГОР SECRET / MAJIC
APTE
EYES ONLY
CH 4
RECEIVING AND HANDLING
Section І. HANDLING UPON RECEIPT ОҒ MATERIAL
| Uncrating, Unpacking, and Checking
(Ñg. 3)
E,
M A [ өй, The uncrating, Unpacking, a
12 ACCESS ONLY" will be
/ is №. Containers marked ің this mann
until euch time as euthorized Pereonnel are available for thero Procedures,
К M and Unpacking the material. Avoid
MAJ 3 isting tools into the interior of the shipping container,
packaging materiala any more than ің ab
interior packaging materials within the shipping container. When
ESS: erating and unpacking the specimens, follow the procedure given in (1)
“+ uh (11) below:
(1) Unpack the specimens іп а top Security area to prevent ассояа
Е of unauthorized personnel,
| (H) Cut the metal wires with а suitable cutting tool, or twiat them
Crsg г with pliers until the Straps eryatallize and break.
ral (J) Remove serews from the top of the shipping container with д
serew driver,
a (4) Cut the tape and воан of the ease liner во that the waterproof
umg paper will be damaged aa little as posuibl ^
2 (5) Lift out tho packaged apecimens from the Wooden case,
(6) Cut the tape which seals the top flaps of the outer cartons; be
careful not to damage the cartons.
(0 Cut the barrier along the top heat sealed seam and carefully
remove the inner carton,
(8) Remove the sealed manila envelope from tho top of the inner
carton,
(9) Open the inner carton and remove the fiberboard inserta, dossi»
cant, and humidity indicator.
(10) Lift out the heat sealed packaging containing the specimens;
arrange them in an orderly manner for inspection.
(11) Place all packaging material in the shipping container for use in
4 future repacking,
b. Thoroughly check all itema against the shipping documents, Carefully
12 4835 15
3 TOP SECRET / MAJIC EYES ONLY
5.1 НЕРВ ИН TION IN ANY PONV tS esee
39 / 340
50 / 569
d~ ХАТА
ak 4
"IPPihg or ka
P'vparat хм:
in
t for tra 208 the
++ ` N
SSEDOF toc. transfer to the
ОГ danan
o the deci “рат "nent no.
óc SIS Tate] areas n pt Tsanaej
{ из will i
E
Cartei hy secu
ered
transport
40 / 340
51/570
h Xtraterrestria] Biologi-
encounters fail und
er the Jurisdiction of MJ Jo
alt with by this Specíal unit only i
оп details the responsibilities of ersons or units making the initial соп.
ct
<. General
Any encounter with entities known to be of ехігагеттезігізі origin is to be
nsidered to bean ; :
“СКЕТ Under no circumstane і
als or their artifacts, Any
icy is absolutely forbidden.
n B. Encounters
Encounters with ЕВЕ may
tegories:
а. Encounters initiated by ERR: O8Sible contact may take place аз a
sult 0f Overturns by the entitie ез. [n these instances It is antici.
ure locations selected by Mutu
ау from public Scrutiny Althou
AU Team will formulate cover stories for
е press and Prepare briefings for the President and the Chiefs of Staff.
| downed craft Contact With Survivorg of
»onnel to preserve security. Civilian wi
the area Will be detained and debriefed by MJ
/—12. Contact with ЕВЕ,
Military Personne] hot having MJ-. 19 or OPNAC clearance вю»
ictly limited to ac °в8агу to ensure the availability of the EBE; for
Rudy by the OPNAC Team
FET i^n
17
герр SFC Fo f,
41/340
51 / 569
52/570
TOP SECRE
Isolation and Custody
п. EBEs will bo detained by Whatever me
secure location as
soon as possible.
Coming i
. If the entities are
в or breathing üpparatus of some ki
ind
# damage to these devices. While all efforts
well-being of the EBEs, th i
RET / МА,
SONLY `
Er
3
Injured or woun les will be treated
ened to the OPNAC Т. .
tely available, F
,
р ер M A J E: be confined to the stoppin bandaging of wounds and splint.
0) MA, 10 of broken limbs. No Medications of any kind are to be administered аз
Е 5 EJ effects of terrestria] medicationg оп
see " ро: sible to prediet. аз
ES ONL) { Ез
per In dealing with any living Ex
iological Entity, Security is
paramount importance All other Consideration
в preferable ]
5 аге secondary. Although
lo maintain the Physica] Well-being of any entity, the lose of
"50m Е life із cousidered acceptable if conditions or delays to Preserve that life
ral $ ny way compromises the security of the |
Once the OPNAC Tea
романс ]
m has taken custody of the EBEs, their care and
ated facilities becomes th
е responsibility of OPNAC
ation will be extended t
9 the team іп carrying out
гей Team Personne] wil] ba given ТОР PRIORITY at all
| regardless of their apparent rank ог status, No Persón has the
% ^ M3 lority to interfere with the OPNAC Team in the performance of its
any by special direetion of the President 0f the United States,
net
E Section ||. NON-LIVING ORGANISMS
Scope.
deally. retrieval fo
г Selentifie study of с
Ваше will be с;
adavers
Dcedure Because
and other biological
liar with thia type of
'ollection тау need to
provide guidance for
“vers and remaina in the field
18
53 / 570
42 / 340
52 / 569
Lm M
etrieval ang Preservation
The degree
ге
А Photograph} good
Verl fw } ag rec 1
Әуес from the site ord will be made of al] aa l x
э
gical ? Physica!
41. 4 EICA gloves с e ,
eather gloves may be * should be worn or. ; cadavers or remains being
ved с
v
! in war с
thi өңі. coverin
. 7 Purpose if ner
фе я : ather
ашаМа All rema; et temains will he refriz sear may be
ы ta; eirigerated or packed
Ts f Hains wj чес and
ФОТ m қ М
» Сы Immediate. remoya] ll be Placed 00 Stretch He time and
Ш detached noval to а secure р chers or in sealed
"d Pieces е facility.
“Taped from sal:
Solid
p- г
. ауаЦаЬ!
ntents e (
№ re : and t
efrigerated оғ packed he ume and dat
зесите facility with
, Surfaces will be
ontamers wil] be
© recorded. Con.
wi
` K
Gg ton
ке аз
q gà soon аз possible and
‚ Н ы
ка
ta
53 / 569 43 / 340 i 54 / 570
CCHET / МАЛО қүра ONLY
/ >... теа. ее “m зе,
УМ жу» лы Lore Ct
ó Š PNG
е“... anao w haa Aa. BAS CA д | | 916
Figure 4. Extroterrestrial craft.
P SECRET / MAJIC EYES ONLY
DDUCTION IN ANY FORM 18 FORBIDDEN BY FEDERAL LAW.
55 / 570
54 / 569
"€ аб,
E à UP are thos
"a. ПРИМ же aparato;
ated LIT.
tings of
“жата whid
: i 4 ose грама it volving
МА ACCESS
qha a;
а Holes of Thumb
АКАЛСИ LE
y { } 0H сазе Should be ішіне! ца but thors ге a Humber ar
orized perso т. И thumb. Under sach of the follow ino headings. Which should Mie
А “piui in determinin be £
о by federal] Р | E the necessity fire f
w up ша iy а! ra
ighting ta [esa than 15
169 аге great Qha; owun Aaa
of caution, Һор, Should а large number of individua] Ç bservess con
' unusual fighting of a few seve
і
Mda duration. И до
^ Number of Persons
:
his docu ma
Persons
'MJ- 12 @
uid по he dia
Short duration Sightings by
worthy of fol ow üp Two ос three competent
pendent Observations Carry the Weight of 10 OF More MUTANS indi
scribed no dual observations
9 people at one
is, however,
1 мин may observe a
range light in the thy, T Нав lesa weight than two reliable
wple observing the same light from different locations In the latter case a
“поп Вх m indicated
Location of Sightings to
hich meet the preliminary Criterion stated al
' Ís in the immediate
For reports involving g
dged as being inversely
ances concerned For example,
Nearest Field Ung Reports
Ve should all be inyestigatod
Operating vicinity of the squadron
Teater distances, follow up necessity
Proportional to the "quare of the dis.
an occurrence 150 miles away might he con
21
MAJIC EYES ON LY
V ANY FORM }
S FORBIDDEN HY P FEDERAL LAW
56 / 570
The MJ12 spy-photographed manual batch, only has the first 21 pages, from UNIT-KB-88.
On second manual page there are also stamped KB-88 21. The 21 may mean it's only 21 Pages.
--Ви in the late 1950's, a person asked the closest Air Force Base, of how to identify UFO's?
And the Air Force Base sent him the whole section of the MJ12 MANUAL,
dealing with identifying UFO's.
That's why the next 4 additional MJ12 MANUAL PAGES look different.
A few pages overlapped each other, but | only used the 4 additional pages, | missed from the first batch.
56 / 569 57 / 570
This unclassified сору is for research purposes. Rev 10.1; 10/21/98; Helvetica headers, Times New Roman text, 10/12 pts.
The Government has declared that sich а classification does not exist.
TOP SECRET / MAJIC EYES ONLY
sidered to have four times the importance ( other things being equal ) than
one that is 300 miles away.
d. Reliability of Person or Persons Reporting. In establishing the necessity
of follow-up investigation only “short term" reliability of individuals can be
employed. Short term reliability is judged from the logic and coherency of
the original report and by the age and occupation of the person. Particular
attention should be given to whether the occupation involves observation
reporting or technical knowledge.
e. Number of Individual Sightings Reported. Two completely individual
sightings, especially when separated by а mile or more constitutes sufficient
cause for follow-up, assuming previous criterion have hot been violated.
А The Value of Obtaining Additional Information Immediately. If the infor-
mation cannot be obtained within seven days, the value of such information
is greatly decreased. It 15 of great value to obtain additional information
immediately if previously stated criteria have been met. Often, if gathered
quickly, two or three items (weather conditions, angular speed, changes in
trajectory, duration, etc.) are sufficient for immediate evaluation. If
investigation is undertaken after weeks or months the original observers
cease to be of value as far as additional new information is concerned.
Generally, late interrogation yields only bare repetition of facts originally
reported plus an inability on the part of the observer to be objective.
g. Existence of Physical Evidence (Photographs Material, Hardware). In
cases where any physical evidence exists, a follow-up should be made even if
some of the above criteria have not been met.
29. Conclusion — UFOB Guide.
It is understood that all above criteria must be evaluated in terms of
“common sense." The original report, from its working and clarity will
almost always suggest to the reader whether there is any "paydirt" in the
report.
Section И. IDENTIFICATION CRITERIA
30. General
When a UFO report meets, in large measure, the criteria projected in
Section I and a follow-up investigation is instituted, then the interrogator
should ask what physical object or objects might have served as the original
stimulus for the report. The word “object” here includes optical phenomena
such as reflections from clouds, sundogs, etc. Frequently one or perhaps two
solutions will be immediately suggested by the nature of the report. The word
“solution” cannot be used here in the scientific sense. A solution in UFOB
work means that a hypothesis has been arrived at which appears to have the
greatest probability of having given rise to the given report. Following is a
group of hypotheses or examples which should prove helpful in arriving at
solutions. A check should be made to see how many of the items are satis-
MJ—12 4838B 22
TOP SECRET / MAJIC EYES ONL Y
57/569 REPRODUCTION IN ANY FORM JS FORBIDDEN BY FEDERAL LAW 53 | 570
This unclassified сору В for research purposes. Rev 10.1; 10/21/98; Нем Ка headers, Times New Roman text, 10/12 pts.
The Government has declared that such a classification does not exist.
TOP SECRET / MAJIC EYES ONLY
fied by the report and how many are missing. An effort should be made to
obtain any missing items as soon as possible. Each typical hypothesis is listed
in a separate paragraph.
31. Aircraft
a. Shape. From conventional to circular or elliptical.
b. Size. Pinpoint to actual.
c. Color. Silver to bright yellow (night — black or color of lights).
d. Speed. Generally only angular speeds can be observed. This depends on
distance but small objects crossing major portion of sky in less than a minute
can be ruled out. Aircraft will not cross major portion of sky in less than a
minute whereas a meteor certainly will.
e. Formation. Two to twenty. Numbers greater than 20 more likely birds
than aircraft.
J. Trails. May or may not have (vapor and exhaust).
g. Sound. Zero to loud shrill or low depending on altitude.
h. Course. Steady, straight or gently curving (not erratic — may appear
still if approaching head-on). Right angle turns and sudden reversals, changes
in altitude ruled out. Note: Although report may indicate erratic course, if
other items check, follow-up should proceed on basis of aircraft because of
psychological tendencies of excited people to exaggerate course changes.
i. Time In Sight. More than 15 seconds, generally of the order of a minute
or two.
j. Lighting Conditions. Night or Day.
k. Radar. Should show normal aircraft returns.
32. Balloons
a. Shape. Round to cigar or pinpoint.
b. Size. Balloons up to a hundred feet will generally appear from pinpoint
to size of a pea held at armlength.
c. Color. Silver, white or many tints. It may possibly appear dark as when
projected against the clouds.
d. Speed. Large scale erratic speed ruled out. In general, hovering to slow
apparent speed.
e. Formation. Single to cluster.
f: Trail None.
г. Sound. None.
h. Course. Straight with a general gradual ascent, unless falling.
i. Time in Sight. Generally long. Note: Balloon may suddenly burst and
disappear.
J. Lighting conditions. Night or day but especially at sunset.
k. Radar. No return except when carrying sonde equipment.
M.—12 4838B
TOP SECRET / MAJIC EYES ONLY
b8 / 569 REPRODUCTION IN ANY FORABIS FORBIDDEN BY FEDERAL LAW
This unclassified copy is for research purposes. Rev 10.1; 10/2198; Helvetica headers, Times New Roman text, 10/12 pts.
The Government has declared that such a classification does not exist.
TOP SECRET / MAJIC EYES ONLY
33. Meteor
a. Shape. Round to elongated.
b. Size. Pinpoint to size of moon.
c. Color. Flaming yellow with red, green or blue possible..
d. Speed. Crosses large portion of sky in few seconds except if coming
head-on.
e. Formation. Generally single — can break into shower at end of
trajectory. Occasionally (but rare) small groups.
А Trail. At night almost always a luminous train which can persist as long
as a half hour (rarely). Daytime meteors are much less frequently observed.
In daytime, leaves a whitish to dark smoke trail.
8. Sound. None, although occasionally reported (believed psychological).
h. Course. Generally streaking downward, but not necessarily sharply
downward. Can on rare occasion give impression of slight rise.
i. Time in Sight. Longest report about 30 seconds, generally less than 10.
J. Lighting conditions. Day or Night. Mostly night.
k. Radar. Return from meteor itself is highly improbably, however, the
train left by a meteor, is a good radar reflector.
1 Other. An exceptionally bright meteor is called a fireball. These are rare
but extremely spectacular and on occasion have been known to light
surroundings to the brightness of daylight.
34. Stars or Planets
The planets, Venus, Mars, Jupiter, and Saturn are generally brighter than
any star, but they twinkle very much less (unless very close to horizon). Stars
twinkle as great deal and when near the horizon can give impression of
flashing light in many colors.
a. Shape. Pinpoint — starlike.
b. Size. Never appreciable.
c. Color. Yellow with rainbow variations.
d. Speed. Stars apparent speeds carry them from east to west in the course
of the night but they are often reported as erratic. The effect is psychological,
most people being unable to consider a point as being stationary.
Occasionally turbulence in the upper atmosphere can cause a star to appear to
jump (rare) but somehow twinkling gives the impression of movement to
many people.
Note: Just because the report sayes the light moves does note rule out the
possiblity
of it being a star unless motion is from one part of sky to another relatively short
time.
е. Formation. There аге no clusters of very bright stars but faint stars are
grouped in their familiar constellations. Note: a report of 4 or 5 bright
clustering lights would rule out stars.
f. Trail. None.
g. Sound. None.
MJ—12 4838B
TOP SECRET / MAJIC EYES ONLY
59/569 REPRODUCTION IN ANY ЕОКЯВИ FORBIDDEN BY FEDERAL LAW 60 / 570
This unclassified copy 15 for research purposes. Rev 10.1: 102108; Helvetica headers, Times New Катап text, 10/12 pts.
The Government has declared that such a classification does not exist.
TOP SECRET / MAJIC EYES ONLY
h. Course. Always describe 24 hour circle around pole of sky from east to
west.
i. Time in Sight. When clear, stars are always visible. Most stars rise or set
during the course of the night. Stars low іл western sky set within an hour or
two. Stars in east, always go higher in sky.
j. Lighting conditions. Night — Twilight.
k. Radar. None.
35. Optical phenomena
This can cover a multitude of things. Original scanning of the report should
be made to attempt to determine whether it more likely describes a material
object or an optical phenomenon. Optical phenomena which have been
reported as UFOBs run from reflections on clouds and layers of ice crystals
(sundogs) to the many types of mirages. No one set of optical phenomena can
be set down as representation for the whole class. There is no limit to the
speed of optical phenomena. Reflections can travel from incredible speed, as
in the case of a search-beacon on high clouds, to stationary. These cases if
well reported will almost always warrant follow-up. Their variety and
connection with upper atmospheric conditions make these observations
especially valuable scientifically.
a. Shape. Generally round but can be elliptical or linear.
b. Size. Starlike to large luminous glow.
c. Color. Generally yellow.
d. Speed. Stationary to fantastic.
e. Formation. Any.
J. Trail. None.
8. Sound. None.
h. Course. Any.
i. Time in Sight. Any.
J. Lighting conditions. Day and night.
k. Radar. No return. In special cases radar response will occasionally have
to do with unusual clouds, and meteorological phenomena such as described
in Minnaert's book “Light and Color in the Open Air.”
І. Other. One of the standard types is the “sundog.” In this a large luminous
halo is seen around the sun with one to four images of the sun placed along
the halo circle at intervals of 90 degrees. Another report often has to do with
a bright planet or even the moon shining through a light overcast. Mirages
reflections are said to occur frequently when temperature inversions exists in
the atmosphere. If an optical phenomena is suspected, routine check of the
meteorological records should be made to establish whether such inversions
existed.
MJ—12 4838B
TOP SECRET / MAJIC EYES ONLY
Б0 / 569 REPRODUCTION IN ANY FORSI/SAQRBIDDEN BY FEDERAL LAW 61/570
«See rs.
62 / 569 52 / 340 63 / 570
Jul
ef L— 55 -
JESSE A. MARCEL, МО. P C The following is a hand drawn picture of what the "J" beam member
$00 NORTH MONTANA AVENUE looked like with helroglyphi i! утро] n le dev be d
HELENA. MONTANA $9451 some value to you. Уйне Like symbols. T hope this may be of
TELEPHONE (406) 442.2410
P =
1157414)
0.5"- 0,75 l
in X Section Ltn “-. ж-е.
Ja
i
Ги:
: Sincerelv
—— "T P— ум
1 2 3 4 5 6 7 8 9 10
63 / 569 53 / 340 64 / 570
ALIEN INSCRIPTION:
HAVE THE ROSWELL UFO DEBRIS SYMBOLS BEEN DECIPHERED?
May 2018
The Folleving im a hand Oca wivigew w€ “hab che "I* Deom menter
¿porod lam with ^eLr*olyp c 155% жушы f Insee ілін ғау іт ¿Í
w us iO ур).
The late Dr. Jesse Marcel Jr., MD was witness to some of the Roswell UFO crash debris as a youngster. His father, Major
Jesse Marcel, was stationed at Roswell Army Air Field in July of 1947 when directed to investigate a large field of strange,
strewn material, fallen from the sky to the desert floor, on a ranch north of town. It was so interesting that he absconded
with a bit of the material and brought it home for his family to see. Skeptics often miss this simple, important detail. If the
debris were so "mundane" (like balsa sticks and balloons) as they contend, then why would Marcel essentially steal
material evidence that he was directed to investigate, taking some of it back to his 12 year old son Jesse Jr. and wife
Viaud, so that they too could see how unusual it was?
Jesse Marcel Jr. was a noted ear, nose and throat doctor, and was at
one time a military flight surgeon. In 1989, Dr. Marcel drew the
symbols just as he so vividly remembered them, the "hieroglyphic"
figures found on some of the debris. The figures were embossed on an
18 inch fragment of a metal-like "I-beam" structure. The symbols were
of a violet-purplish metallic hue and were about % to % inch tall. When
Marcel Jr. showed his drawing of what he remembered the debris
symbols looked like to his mother, she concurred that they were her
recollection as well. SEVERE SEE EU the characters on
it, that Marcel Jr. was able to recall and recreate them decades later
Dr. Jesse Marcel Jr.
WHAT THE SYMBOLS SAY:
THEY COMMUNICATE TECHNICAL INFORMATION Or origin of Spacecraft.
One man said the symbols meaned: —No Smoking When Light Is Lit.
64 / 569 54 / 340 65 / 570
Here are a photo of the I-beam Marcel spoke about.
I am truly sorry that Marcel Junior passed away, before
65 Asepuld show him this photo of what he described.
š
66 / 570
26 / 570
26 / 569
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
293 / 569 293 / 570
ІІІ”.
А. | № |
1 `
N 2
\ М» / /
% Ñ 4 w- Ë
алға = a ik
> ) МО Jos 2 Ж
h „ - Ж `
Уч. к ~ A <
m.
=
THE UNITED STATES S-4 FACILITY.
66 / 569 56 / 340 67 / 570
54 MOUNTAIN OPENING BAY TO THE RIGHT.
В / 569 Entrance
^
t
x
аже
AS
AREA 5-4 SUB FLOOR LAYOUT
JRAWN BY MICHAEL SCHRATT |
[DATE FEBRUARY 28. 2010 |)
Exploded view of Area S-4 showings levels 1-5 as described by Drs. Dan Burisch and Marcia McDowell.
The facility was originally designed as a biological weapons laboratory in the early 1950's. After arriving at
Area 51, Dan would either be driven by a bus or flown by helicopter to Area S-4.
71 / 569 60 / 340 72/570
72 / 569
алы
AREA S4 f перст хтон
(LEVEL 4-1) Ww iih, пилы
(THE DARK SIDE OF THE MOON) £ we ee ae
SECURITY CAMERA DOMES WERE POSITIONED EVERY
10 FEET ALONG THE HALLWAYS
CEILING мент MEASURED APPROX 8 ТО 12 FEET
TRANSPORTED TO ТНЕ
FACILITY FROM AREA 51 BY WAY OF А STANDARD.
BLUE COLORED AIR FORCE BUS Ой HELICOPTER
HANGAR 1
LOCATION OF "SPORT MODEL”
REF HANGAR GAYS 1 & POSSIBLY 2
LOCATION OF з WANT TO BELIEVE" POSTER 2
A omma
PSS TO BUS OR MELICOPTER
Level 1 housed fire control equipment, a dining facility, communications, security/surveillance, an avionics
laboratory, and the archives or files department. Provisions for a propulsion research laboratory are also housed
on the first floor of Area S-4. The dining area seats consisted of round tables with four attached round seats. The
cafeteria seating arrangement was broken down specific projects which included: Project Galileo, weapons
research, Project Looking Glass, and Project Aquarius (see level 4-1 floor layout drawing). Note: special
members of MJ-12 had their own designated table in the cafeteria. The interior of all nine hangar bays included
a red circle which contained the designation 4-1 in red text.
61 / 340
73/570
73 / 569
AREA S4
MEYDOS TEMA д (LEVEL 4-2)
PINE GAP AUSTRALIA "ALICE'S FLOOR"
LOOKING GLASS DEVICE
(SEE OETAIL VIEWS ON SEPARATE PAGE)
W 115.00616
ASSIGNMENT С
MAJTSEO 18
ERB PROGRAM CODES
"FUP BOOK" WORN ON ARM
(GALACTIC POSITIONING CODES)
WALKWAY TO PRIMARY
u
(SEE DETAIL VIEW)
TRANSPORT PADS
(SEE DETAIL VIEW)
ORIGIN OF P2 ORIONS
MAN-MADE STARGATES WERE
REVERSE ENGINEERED FROM
ВАМ
И POSITIONED EVERY 10 FEET
A STUFFED "ALICE IN WONDERLAND” (VEGAS CASINO TYPE) ROLL IN THIS DIRECTION
AUTOCAD DRAWING BY: MICHAEL SCHRATT 6/2/2010
PER DAN BURISCH TESTIMONY AND SKETCHES:
Level 2 or “4-2” was known as "Alice's Floor". This specific floor contained a laboratory for weapons
research and development, three board rooms, and provisions for emergency supplies. Also located on level 4-2
were two specific areas which contained components for project sidekick. Level 4-2 was also the location of
Project Looking Glass. This device utilized six (composite) electromagnetic fields, and a height adjustable
rotating cylinder which is injected with a specific type of gas. The entire assembly can be rotated 90 degrees
from the horizontal axis. This allows scientists to warp the local fabric of space-time both forward or backwards
by long or short distances relative to the present time. The Project Looking Glass device was used to predict the
potential probability of future events. Once the device is tuned properly, images of probable future events are
projected in open space within the fields, similar to a hologram. The data output of the device (images and in
some cases sounds) were then captured via high resolution audio-video capture devices. If multiple probabilities
of the same event were displayed, they could be de-interlaced by use of specific software platforms. Next to the
Project Looking Glass device were two "transport pads" which could teleport physical matter or humans from
one location to the other instantly, but not always reliably and with certain disastrous outcomes during testing
phases. Dan had the unfortunate experience of being in the room during one of those unfortunate outcomes, and
witnessed a death.
62 / 340
74/570
74 / 569
AREA S4
(LEVEL 4-3)
AUTOCAD DRAWING BY MICHAEL SCHRATT 6/2/2010
PER DAN BURISCH TESTIMONY AND SKETCHES
Level 3 of Area S-4 contained the residential living quarters for members of Majestic 12. Dan and I are only
willing to say the following, and only that information may be represented as coming from us: “Тһе former
Leader of the Consistory of the Majestic was accurately identified by Dr. Dan in an affidavit sworn under
penalty of perjury. That former leader was a high ranking official in:
a) The United States Navy
b) The National Security Agency (NSA)
с) The director of National Intelligence's Office
That former leader is properly indentified by the name: “7. McConnell". The residential portion of this level
consisted of 12 apartment-like rooms, complete with a sunken living area, television and rest room. Level 3 also
contained decontamination wash stations, along with a storage facility. Additionally, level 3 contained a board
room, and provisions for a fully equipped biological laboratory consisting of tissue and cell culture analysis
areas, and dissection facilities.
63 / 340
75/570
75 / 569
AREA 54
(LEVEL 4-4)
ТОННИ E AQUARIUS LEVEL
(NOTE. THIS FLOOR 1S DEVOID OF
RED OR BLUE UNES ON THE FLOOR)
ج
Utere hr 1
mE: |
H!
Шы
Г. 1
Г | ]
ЕЕ
AUTOCAD DRAWING BY: MICHAEL SCHRATT 6/2/2010
PER DAN BURISCH TESTIMONY AND SKETCHES
Level 4 aka the “Aquarius Level” contained five decontamination areas, along with multiple laboratories and
equipment rooms. Level 4 also includes the only access elevator to Level 5. While working at Area $4, Dan’s
security badge number was: H-6196MAJ. Dr. Marcia's Majestic badge number was Q-3192MAJ. According to
Dr. Dan Burisch, his boss at Area S-4 reported to the Majestic 12, who in turn reported to a cover committee
who reported to the Committee of the Majority. The cover committee’s job was to condense, and sometimes
prevent reports from reaching the committee of the Majority. The Committee of the Majority was an
internationalized version of the group called “The Majestic” which had been started in 1947 by President Harry
S. Truman following the Roswell crash. The Majestic 12 were organized after the Roswell crash, not because of
extraterrestrial contact; that could have been handled with the existing infrastructure of the U.S. military, while
it was being reorganized following World War II.
64 / 340
76/570
cen ornare stanon mesrangon wi AREA 54
ШЕШ Soot OF ETHER ME WOLE SAFETY
ou TENS 72 (LEVEL 4-4 BCL DETAIL)
& WOULD BE ASSESSED. MF TESTED DRESSED
чег Тона каз. a CONTROL их M—
n ROLLED ADMISSION.
PRESSURIZATION CHECKS ТО ECL 2 BLUE ZONE FOR EGRESS OR REENTRY
TO BCL LAB.
THESE LOCATIONS IN TOTO WERE REFERRED BCL 2 TO 3 BCL2 RED UNE TO
“L. لومت дена ien سملم AMET 'BCL!TO2 PASSES FROM RED UNE
WOULD RADIO "UNIT (THIEN OUR NUMBER) DRAGON ux
вс TO UV TESTING ісі
BCL? TO 1 X PRESENTATION AREA
TO BCL? DECON BLUE LINE
AUTOCAD DRAWING BY: MICHAEL SCHRATT 7/30/2010
PER DAN BURISCH TESTIMONY AND SKETCHES
Detail view of Level 4-4 showing Bio Containment Labs.
76 / 569 65 / 340 77/570
77 / 569
AREA S4
(LEVEL 4-5)
CULA mame таз.
дрян эче. à жоя коо т бав FLOOR
Gat TE ACE GAP POR VIC PLA
844 CLEAN ayama FLOOR
з ORANGE STAR. 2 ~
AFOROG 4 SECTIONS 27 рна ест
OF v RATES EACH nn
памет CONQUTS
Маст) TO
само
vanont MODULE
емо TH SER VOR
Sanon
Tern
Am осема, вита, FIT тапта
r^ OSG EQUIPMENT
p
OVERHEAD.
STANCANO маю.
OFFICE атм
PULMONARY AND
AW EQUIPMENT
Шз Талси GATING LAYOUT
Nim LOCKING UP
мана
rv MON QUALI
VIRA TRADI
жолым!» мі»
(M UPPER тн coman VIEW.
селси ит вето A
LOW RUMBLINGS NOSE
DUE TO те ка
мех IN OPERATION
sosson urt —
= UP CONFIGUMA TION IN PARTIAL DOWN
CONFIGURATION.
SOS LT DICTA.
AUTOCAD DRAWING BY MICHAEL SCHRATT 8252010
PER DAN BURISCH TESTIMONY AND SKETCHES
(S4-4/5 GANTRY VEHICLE AND OVERVIEW OF CLEAN SPHERE ENTRY PROTOCOLS)
Let FLOOR ими, Cun
АД
T
В а Е
TAMINATION AREA TO CLEAN SPHERE |
кета тие ANTHY менси WAS STUL т DECON ABA ОЦ ОАО MENO мес-схесхео SUITED. FITTED ОЕ ANO COMPRESSED,
Stout ПВО WOE ONCE Irt RAN SIR tic МАМЕ TOTES САМО < еее AT T VIAE T рис DAFEN DOO
MLB NCC Mi! Өтм P A CLOSED қорта WIN ТИ UTERO CLOBURE. DOW ON ОРОМ. ORAT TO RATER 1 WOULD STEP
ее ne Te Әлен DOON там өлер OV TME COLLATED КИМА. LORI RU те LA 1 WOULD там
ВКС 1O Ine miu, CCH AEA NONS PORT ON тес НОВАВА BILE TOA РАМО. ANG HOSE U TO ТЕ W TERNAL ORUM ONCE
Tee COMARCA DOR AND NP OW HAIN COM PSD | WOLD BARCO T PRON Tr EXTERNAL HOUPI ДО Rese AAD MAL Tre
Meu МО + 22841 WOULD TIN LOOK TE EDN DER AND STU» OY t GANT РК fre ORUM WEAD OF IBN.
Saver FORTE scanat Tr CE NC ORI Pets UV ВОТ БҮ WG ADDITA Or A UCC NORTON ОМА Gnd мезон uA НЕ
DIE ORT tates te ыы PROPER CLOSURE TE GAB CLADE EVACUATED AND А ТЕМА TON Gad ЖАР E
осо POLLO) UE CON. EVACUA TON МО RETEST Tee ORAM wA BE отеля TURNER БОША TO T CLE
Sese neces Br NOW DA BUSIE ROO RE СОЧНО Tri ANY МОЕ VA Tre О CONTHOR TOWARD Yi GLAN
rere HROPUR PROC RQURT WOLD tt Om US TO we СТ ПА өс малыс TO ve CLEAN BAERE S PONT. ВИ WE MEARE
томына Y ROTATE Te талы, ORUM САТО COME OREM ABOVE TO Tt YELLOW ORANGE ООО ЯЗ MAYO CTIA
eR E wt NAME BERI) ID rd ORAL CAA O STOF А W PORTER WERE теп тт. ССИ MATCHED T REOR OF Ir
OR coon snp Tran Wa WOULD БАП ON ATED AN МАҒЫ WOULD SONG. T s ON Аш CUNTAPS WOKLD STAAT ANC уа
ARRAS ae edm WE самса Yu YELLOW BONS WOA O BE өлемі
THE EXTIJUON OF THE ORANGE ОСОН WOULD BE EXPOSED TO ТЯН ГА ТН GAB. АЛУ! АВ BEFORE iN T
RUM. ANO I1 WOULD BE PRESSURE F VACUATED Он THE GREEN DOOR BOE OF THE DAUM. А COVER
LOCK CABE DEC TEO BY tra TRANSPARENT GREEN COVER ABOVE) WAB PLACED OVEN THE QUTMOE
өт A BUNT, LOCKED INTO PORTION. AND NAD OFTECON EQUIPMENT TO PREVENT ANY LEAKE AFTER
ANIER ROUND OF TESTING. THE INTERNA CLOSURE WOULD BE LOWERED. AND төс YELLOW ООО
WOULD E OPENED | WOULD STEP INTO THE мй LOCK BETWEEN THE ORANGE АМО YELLOW DOORS. THEN
FULL THE MOBING TOWARD МЕ ТО GRASS TI BIVALVE DEVICE OM THE NOSE, AND CONNECT THAT DEVE
TO YE SECURE NOSNO ADAPTER LEAD ТО ТЕ RED ООО THEN THE YELLOW DOOR WOULD 08 CLOMID
ANO LOCKED WITH EXTERIOR QASKETED LOOKS PRIDSISUNZATION AND CONT AAMENT WAS AGAIN CHECKED.
OM ORDERS FROM THE GALLERY ON. Y (GALLERY GUPDIVIBON. PROCEED ORANGE ) THE ORANGE DOOR
WOULD BE OPENED ANO Wt. FEEDING THE BIVALVE DEVICE INTO T ORANOÈRED тт Ос РЕНО
A BUPPONT CARIOR THAT LOCKED AROUND TME HOSE) | WOULD ITER INTO THE ORANGICANGD INTERLOCK
AND PLACE MY NICHT HAND Ом THE RED DOOR ANO ANNOUNCI "CONTACT" OVER THE MADIO THE GALLENY
SUPERVISOR WOULD THEN BAY “GALLERY ЧЬИ, PROCEED RED "| WOULD SAANG TE RED DOOR
OPEN AND TO THE MIONT STEP INTO Tr CLEAN SPHERE ANO TUAN ANO LOCK THE ORANGE DOON ВЕРНО:
ме міне BEING VERY CANEFUL TO МОТ DAMAGE THE NONO INTERLOCK AND THE DOOR WAS CLOSED АТ
THAT MOMENT 1 WAS STANONG INGIOE THE CLEAN НЕЕ ANO THAT CONSTITUTED DIRECT
EXTRATERRESTRIAL CONTACT WHERE | BECAME RESPONSE FOR ЕМИ ЛЕО С ОМА ТС. PROTOCOLS |
CONNECTED MY ACCESSORY "OSING AND COMMO LEADS TO TY INTERNAL HOSINGICOM GEL ЕС TONS
FOLLOWING TESTING OF THE CLEAN SPWERE HOGG VLOWET AND COMMUNICATIONE, | CLOSED THE VAL VED
TO N ORUM Офе DETACHED FROM IT, AAD LOCKED THE RED DOOR FROM THE NDIDE UBAO GALRETES
LOCK CNW NONE ON тб INSIDE OF THE CLEAN SPIRE S ENTIY PORT PROM Тн MOMENT UNTIL. ME
JT PROCEDURES V WOULD ВВ REE TO MOVE ABOUT THE CLEAN SPHERE. WITHIN PROTOCOLE ANO WOULD
FE TO THÉ. NIGHT ANC REGN жом ANNOUNCEMENT PROCEDURES TO THE EXTRA TERRESTRIAL
AUTOCAD DRAWING BY MICHAEL SCHRATT 8/25/2010
PER DAN BURISCH TESTIMONY AND SKETCHES
66 / 340
78/570
N
N
N
^ “>
h e ڪڪ AÁ << Ж
79 / 570
78 / 569 |
DULCE UNDERGROUND MILITARY LABORATORIES.
79 / 569 68 / 340 80 / 570
In March 2011 I received the following email:
Lon, I read the letter you posted recently about the Dulce Labs genetics
experiments and wanted to share my experiences with your readers. When I was
an undergraduate studying genetics in the mid-1970s, I did a 10-month internship
at Dulce Labs. My primary duties were on level 1, that is where I spent almost all of
my time. But once a week I accompanied one of the junior researchers to levels 5,
6, and 7 to collect data tapes and other documentation. I never got past the "clear
zone" on those levels, but on a couple occasions I heard inhuman shrieks and
wailing noises on level 6. I was told that level 6 was a psychiatric facility for
especially disturbed patients, and that they were known to have emotional
outbursts.
On one occasion while we were waiting for someone to bring out the tapes, I heard
part of a message come through the intercom, and the words are burned into my
memory.
VOICE 1: "CELL 34 COMPROMISED, ENTITY HAS BREACHED CONTAINMENT"
After a pause a second voice came over the speaker:
VOICE 2: "AVAILABLE PERSONAL REPORT TO THE BLUE ZONE FOR C&C. MAXIMUM
FORCE AUTHORIZED."
The guard at the desk told me and my colleague that we had to leave immediately,
we were rushed back into the elevator before the materials were delivered to us. It
was two days before they let us go pick up the tapes, and when we went that time,
everything was normal. Nobody ever talked about it. I tried to ask my colleague,
the junior researcher who was there at the time, about it, but he said he didn't
know what I was talking about, and something in his tone told me I'd better forget
about if too.
After I graduated I was interested in returning to Dulce because I was really
excited about the potential for genetic science, and Dulce had some very advanced
equipment and knowledge - better than anything being used anywhere else. But I
was told that there weren't any openings. I wondered if I was being blown off
because of my curiosity about that event, if I was considered a risk. I tried
contacting the junior researcher, but never got a response from him. - MP
70 / 340
Another person wrote: (THIS PERSON WORKED AS SECURITY OFFICER HERE)
-6th Level - privately called "Nightmare Hall." It contains the genetic labs. Here are
where the crossbreeding experiments of human/animal are done on fish, seals,
birds, and mice that are vastly altered from their original forms. There are multi-
armed and multi-legged humans and several cages and vats of humanoid bat-like
creatures up to 7 feet tall.
-7th Level - Row after row of 1,000s of humans in cold storage including children.
B2 / 569 71/340
Where exactly do the heavy psychiatric patients come from, and what
kind of medical project is being promoted behind closed doors? Deep
down in an underground biological laboratory in a mountain range?
| better load my nukes because heads are gonna fly. /GN.
72/340
چ
| A CAR TO COMPARE SIZES IN IMAGE '
GROUND LEVEL AT
DULCE
UNDERGROUND
77 LABORATORIES.
— GROUND LEVEL AT
DULCE
JUNDERGROUND
"LABORATORIES.
——— ——— у cm
b.
= 1 А [ E ` а
22922 21, A
Í - cf A i |
4--: FANS |
` к” т аш. Е
|
86 / 570
«See rs.
86 / 569 75 / 340 87 / 570
N
N
N
^ “>
134 / 570
133 / 569 "
HERE FOLLOWS THE
PHOTO SECTION
OF THIS DOCUMENT
*Maps.
*Satellite Images.
*Technical Specifications.
*Scans.
*Photographs.
—SEE THE FIRST PHOTO OF THE 6-FINGERED ALIEN RACE.
т
*
i
88 / 569 77 / 340
78 / 340
-
How to interact with an alien!
92 / 570
92 / 569 81 / 340
95 / 569 96 / 570
194 /-ROSWELL-COVER-UP-READING-PART -1-ONE.png (ene image data, 1456 x 1489, 8-biucotor НОВА, поп-меласеа )
Army Disk-ounts
New Mexico Find
As Weather Gear
FORT WORTH, July 9.—J/P)—An
examination by the Army revealed |
last night that a mysterious object
found on a lonely New Mexico
ranch was а harmless high-altitude
weather balloon—not а grounded
flying disk,
Excitement was high іп disk-con-
scious Texas unti] Brig Gen. Rog-
er M. Ramey, commander of the
Bight Air Forces with headquarters
Army Disk-ounts
New Mexico Find
As Weather Gear
FORT WORTH, July 9-4Ф--Ап
examination by the Army revealed
last night that a mysterious objec
found on a lonely New Mexico
ranch was a harmless high-altitude
weather balloon—not a grounded
flying disk.
Excitement was high In disk-con
scious Texas unti) Brig Gen, Rog
er M. Ramey, commander of the
here cleared up the mystery.
The bundle of tinfoll, brokenj
wood beams and rubber remnant
of a ballon was sent here yesterda
Roswell harbored
The 509:th here cleared up the mystery. UA E. Ан:
The bundle of tinfoil, broken But the general said the objects
š th hed Ins of a Ra
Atomic Bomb wood beams and rubber remnants wind target used to determine thd|
G of a ballon was sent here yesterday direction and velocity of winds а
rou by army air transport in the wake MER манаш
р, of reports that it was a flying disk. eer dh thet ЫМ his TONA
either stition Т , ва14-“ из
Headquarters, vii us iu ж се ту on d because they go much high
er than the the «ye oan | can Bee” _
New Mexico, wind target used to determine the
direction and velocity of winds at NOT A FLYING DISC—Mejor Jesse A. Marcel of Houma, La., сл LIST PURSE PURSE HOLDING
U.S.A. high altitudes. equos eset of би 509‹һ pac Group at Roswell, New od ed
Newton,
b F'o Worth, Texas, Arm Air |
Warrant Officer Irvin
I SPACECRAFT PARTS. THIS U.S. ARMY ALIEN [EVIDENCE|WAS NOT SPACECRAFT PARTS.
SHOWN TO THE PUBLIC OR
NEWSPAPERS.
L w rae
= چ
Claes Army
21 3 в Slacking
+ ind (Courts Ката
RAAF Captures Flying Saucer
On Ranch in Rosy 1 Regi
ист ш Мо
Fare. v 227”
и”: 0
+ 4.
Some of Soviet Satellites
May Anend Рагу Meeting
"7 Pus nd Washa S
== ghey! Wage Paci в
Alien
alphabet
itl:
int
4
М
| hi
— — < ——
TREE
|
DEAD A
AUTOPS а 85 / 340
|
Ч
Н#ЕЯР Z [- E
| Aircraft | Intact, о ЯГОДА, or semi- intact аггета oi Exiryterresi: ай де үл
Intaci device, :
| | functional.
Damaged | Any Mechanical o; electronic dey ісе or machine which a Ppears to be damaged but
device. | mostly complete
! Powcrplant. ! Devices and Machines o fragments Which ane possible Propulsion units, fuel, and
Associated control devices and paneis,
Шеті feg | Fragments composed
fragments. | science and ссору,
| Unidentified | Fragments Composed of e!
| fragments |
7 | Supplies and
| Provisions,
8 | Living сашу. е,
2 Non-living
ic materials of 3 Support nature such as clothing,
ingestibles, erc
or reasonable heal.
ог portions of organisms, organic remains and
Other suspect Organic mater.
Printed matter. electronic recordings, maps. charts, photographs and film
Any device or portion of з device thought to Бе offensive ог defensive weaponry,
| сту,
10 | Media.
11 | Weapons.
86 / 340
апо mar Шақ ШІК.
| Any mechanica Clronic device тйс wh |
| у Вака! or electronic device or machine w! Ich appears 1e be undamaged аты)
|
(| IF-101.K
ID. 301 р Аса $1 S4
| DD-303.N | Аре 5154
| PD-40-8G | Area 515;
|
| Arca $] 5-4
|
|
| UF-I(G-M ! Ақа 5154
| SP-33]
|
|
| ЕВЕЙ
! EBE-XO
| Blue Lab WPL |
| OPNAC ВВ5 01
| Біге Lab “Рв!
|
MM-544 | Building 21 KBSR
WW-010 | Ara $! 54
|
i
| Exc gio
n ON Mountains |
> m №: +
EU “es ·..
No
PN
Ка | |
. a Inyo National > 5
4 "Forest
White Mountains
Anse! Adams.’ £N к. Wilderness.
Wilderness а - ^
Sierra National
Forest
ў,
John Muir қ
Wilderness па |
2
| Sequoia- Inyo-Mountoins
Kings Canyon Wilderness
4 Wilderness
\ 77 бедибіо
4 National
Park
Golden
") ж Trout Wilderness
Porterville |
' Sequoia
National
Flectronic
Combat
Systems
(ECS)
Death Valley
National
Park
Р
, Basin апа
Range
National
Monument
Nevada ^
Test and
51 Training
Nevada 84 Range
National (NTTR)
Security
Site Desert
National
Wildlife
Refuge
Pahrump
Forest Naval Air
Warfare
Center (
China Lake | “89 / 340 Kingston
копа
[ET UNIT
PDF -HEAVY NATIONAL SECURITY=
Top Secret - Map of AREA 51. AREA Jl
Used by the Central intelligence agency. FIELD ELEVATION 4.400 FEET
The CIA Project OXCART.
- --
7 ЩЕ: uu "yoy alt =" š
ORY LARE BED
RUNWAY EXTENSION РАЦ Т
e ки
= - 6 үи
* ° ж
STATIC TEST AREA
Conca It
капо AREA RUNWAY 1465 FEET
STATIC TEST AREA
4
e Mw шиа
© i itita IOP Ж#Н ШШ |
Delamar
, м й
E age ж” $
و Indian} [Springs
18. Maintaing the{ MAJESTIC |security has been successful in part because of
cempartmental function of classified activities ef the level achieved
by the security system оГ the Manhattan Prefect, апё new legislation
protecting nuclear weapons development.
ecurity operations о [usr | it has been necessary
dividuals who would comproifiise the intelligence
while aistasteful L tires, the ure of
easures have been executed, The untirely death с: ocere tary
og deemed necessary апі rovt іа Ire
12, General Statement: If such a evitis іп cU ore sb pas Мы: = E зи
re the ^uslic!'s trust i a
+
hat the following veuld eccurr
pattern i ҒаліЛілзг--спрізумепі, ol suis raive agents; infilt*rition
tactics; incitement of disorder and chacs to disrupt normal беспесу and
thereby to undermine popular confidence in похегиееть and leaders; seizure
of authority without reference to the will of the people."
17
13. | Referenced RIPORTI TO ТИТ соу т, ҒАГГ) 1-7, dated
19 September 1947, mentions: "In сос ге with your directive в е « of
u i77, the attached We PONT eet руа AUCTION із perceopbinlly
Submitted. Іп consonance vith your instructior азер FE ізі»;
1
[i
5;
Treasury, Маг and Каму Depnrteonis or 010i: n D bes ul set
finding miscion concerniec the гай ту of зт! ТОНЕР тт. То
‚ ан абаке fron "ет ther сезсе :, >
.
:
principle areas vere vicited, Тес Safe ef farts сете ede ta v
all levels 27 ceionticis ] ee eS wq ct tuom «қ жө ¥ Be Me ЖЕ
РА X] lasek баба ома аи Се а БАР ыла UU
held with
1,200 remore Š 1
were received and considered, The report precenbs эсил а (25 ol
background my estimates of tho situation, current апі projec
ІЙ U,S,, ani U,K,, and recenmeniations deemed ta bo gout eourc
^50 for formulating plans and policies concerning defenses of 7?
2 countries of the United States." $.
li, Аз a result of the Arining торе" President was compelled to
sign into law the l'ational Security “ct sf 17347 vhich саге inte effect
on 19 September, This did not help the DCI in carrying out the
directives of the NSC in matters ef intelligence collection concerning
the flying saucer problem. Tho Intelligence Advisory Peard wes rot
allowing the new СТА to š iain ыы
s saucer data
=
95 / 340 p Зареди
Іледе a
108 Ж
107 / 569 7 | | $ 109 /-570
`a.
RUSSIAS NEW ELECTRONIC WARFARE IMAGES. X-RAZE.COM
NN
¥
Russian
electronic
warfare
worldwide.
1P501
—
97 7340
The RF Hearing Ellect is explained and analyzed as a
thermal to acoustic demodulating process. Energy absorp-
поп ш a medium, such as the head, causes mechanical
expansion and contraction, and thus an acoustic signal.
When the expansion апа contraction take place in the
head of an animal, the acoustic signal 1s passed by conduc-
поп to the inner ear where it is further processed as if it were
‚ап acoustic signal from the outer саг. Animal = Human.
1117/5
Ask them what the Magnetron Cannon is for?
WARNING!
RADIATION HITS YOUR BRAIN THIS WEAPON DESTROYS THE
BRAIN BARRIER, SO YOUR BRAIN
LIES OPEN TO ATTACKS OR EASY
INTRUSION.
CAUSING
Unrepairable damage.
This is one of the pictures
YOU are not supposed to
see according to the
Department of Defense.
THE PHOTO WAS ACCIDENTLY RELEASED
BY THE U.S. DEP. OF DEFENSE AS THE
FIRST SATELLITE SELFIE. E
The worlds first
ATTACK
SATELLITE
Жж 'SELFIE'..........
oecona
а LAT
| | “ее ы . Engaged in Work
ивозивознано 'Busy' Thinking
Relaxed
a Images Visuals
.. Self-Introspection
Day Dreaming
Between Awake/Sleep
\ Th MAN A- Deep Meditation 7
ДЫ "Y Y —əboo Flow of Ideas/Creativity
Altered States
Theta«sm)|
1 | Unconscious
_ Very Deep Sleep
Delta «=.
If one transmits signals or disturbance on above frequencies,
then your brain can't function alright.
And guess what. There's a lot of transmitted noise in those frequencies,
meaning your brain has trouble giving you deep sleep.
110 / 569 99 / 340 112/570
United States Patent пя
Brunkan
[54] HEARING SYSTEM
Wayne B. Brunkan, P.O. Box 2411,
Goleta, Calif. 93118
Appl. No.: 202,679
Inventor:
128/421, 422, 7 1/68
References Cited
U.S. PATENT DOCUMENTS
3,629,521 12/1971 Puharich et al.
3,766,331 10/1973 Zink
OTHER PUBLICATIONS
Cain et al, “Mammalian Auditory Responses ... ",
IEEE Trans Biomed Eng, pp. 288-293, 1978.
128/402.5
128/420.5
18 mins ago"
13 / 569
11] Patent Number:
[45] Date of Patent:
4,877,027
Oct. 31, 1989
Jaski, "Radio Waves & Life", Radio-Electronics, pp.
45-45, Sep. 1960.
Microwave Auditory Effects and Applications, Lin, 1978,
pp. 176-177.
Primary Examiner—Lee S. Cohen
Attorney, Agent, or Firm—Harry W. Brelsford
[57] ABSTRACT
Sound is induced in the head of a person by radiating
the head with microwaves in the range of 100 mega-
hertz to 10,000 megahertz that are modulated with a
particular waveform. The waveform consists of fre-
quency modulated bursts. Each burst is made up of ten
to twenty uniformly spaced pulses grouped tightly to-
gether. The burst width is between 500 nanoseconds
and 100 microseconds. The pulse width is in the range
of 10 nanoseconds to 1 microsecond. The bursts are
frequency modulated by the audio input to create the
sensation of hearing in the person whose head is irradi-
ated.
Ә militaryhighcommand.com . Attack on Teacher May Have Been |
102 / 340
UNITED STATES SENATE
Washington, D.C. 20510
SR—Russell Building
SD—Dirksen Building
SH—Hart Building
114th CONGRESS
SUITE AND TELEPHONE LIST
Copies Available m Sergeant at Arms /IT Support Services, SH-121
All telephone numbers
preceded by 22 prefix
Vice President
BIDEN, И. Joseph В.
ALEXANDER. Lamar
AYOTTE, Kelly
BALDWIN, Tammy
BARRASSO. John
BENNET, Michael Е.
BLUMENTHAL, Richard
CAPITO, Shelley Moore
CARDIN, Benjamin L.
CARPER, Thomas R.
CASEY, Jr., Robert P.
CASSIDY, Bill
COATS, Daniel
COCHRAN, Thad
COLLINS, Susan M.
COONS, Christopher A.
CORKER, Bob
CORNYN, John
COTTON, Tom
CRAPO, Mike
CRUZ, Ted
DAINES, Steve
GILLIBRAND, Kirsten E.
GRAHAM, Lindsey
GRASSLEY, Chuck
HATCH, Orrin С.
HEINRICH, Martin
HEITKAMP, Heidi
HELLER, Dean
HIRONO, Mazie K.
HOEVEN, John
INHOFE, James M.
ISAKSON, Johnny
JOHNSON, Ron
KAINE, Tim
116 / 569
INFORMATION
From Outside Dial-
Senate—224—-3121
House—225-3121
From Inside Dial:
0 for Capitol Operator
Assistance
9 for an Outside Line
THE POLITICAL
AVENUE™
© THE GLOBAL POLITICS MAGAZINE!
MARKEY, Edward J.
McCAIN, John
McCASKILL, Claire
McCONNELL, Mitch
MENENDEZ, Robert
(D-MA)
(R-AZ)
(D-MO)
(R-KY)
(D-NJ)
MERKLEY, Jeff (D-OR)
MIKULSKI, Barbara A. (D-MD)
MORAN, Jerry (R-KS)
MURKOWSKL Lisa
MURPHY, Christopher
(R-AK)
(D-CT)
MURRAY, Patty (D-WA)
NELSON, Bill (D-FL)
PAUL, Rand (R-KY)
PERDUE, David (Е-СА)
PETERS, Gary С. (D-MI)
PORTMAN, Rob (R-OH)
REED, Jack (D-RD
REID, Harry (D-NV)
RISCH, James E. (R-ID)
ROBERTS, Pat (R-KS)
ROUNDS, Mike (R-SD)
RUBIO, Marco (R-FL)
SANDERS, Bemard 1-УТ)
SASSE, Ben (R-NE)
SCHATZ, Brian (D-HI)
SCHUMER, Charles E. (D-NY)
SCOTT, Tim (R-SC)
SESSIONS, Jeff (R-AL)
SHAHEEN, Jeanne
SHELBY, Richard C
(D-NH)
(R-AL)
STABENOW, Debbie (D-MI)
SULLIVAN, Dan (R-AK)
TESTER, Jon (D-MT)
THUNE, John (R-SD)
TILLIS, Thom (R-NC)
TOOMEY, Patrick J. (R-PA)
UDALL, Tom (D-NM)
VITTER, David (R-LA)
WARNER, Mark К. (D-VA)
WARREN, Elizabeth
WHITEHOUSE, Sheldon
WICKER, Roger F. (R-MS)
WYDEN, Ron (D-OR)
Published hy the Senate Sersaant at Arm: /TT Summort Services
(D-MA)
(D-RD
105 / 340
ON/OFF — —
ON/OFF — —
ON/OFF — —
ENTER» — —
МО [рев sc EXEC |
DATA үңду МЕК |4 Вет
Tw
J K ES FERAS FCS
Earth перуки ка refers to эс aaa the рола == called Earth Ground.
a
119 / 570
United States Patent по
Ritland et al.
ASSEMBLY
L DISPENSER
[75] Inventors: Harold М. Ritlund, Bellevuc; George
H. Thacker, Kent, both of Wash
Assignec: The United States of America as
represented by the Secretary of the
Air Force, Washington, D.C.
[21] Appi No. 882,526
[22] Filed: Mar. 1, 1978
É Ist. СП ..................... FIF 5/02; F42B 13/50
52] US. С. iscsi 09/1 B: 102/39 CD;
33/18 E
[5$] Field of Search ............. 102/89 CD, 344, 35.6,
102/37.6; 89/1 819, 1 В; 343/18 Е
References Cited
U.S. PATENT DOCUMENTS
[73]
GER SSS
А 6
— 53
United States Patent
Werle et al.
“= кра
x E TEN
ето o ooo UR, чь чь чь жы
https-//militaryhighcommand.com/CENTRIFUGAL-AIRCRAF T-DISPENSER-PATENTS-from-WWW-MILTT ARY HIGHCOMMAND-DOT-COM.png
4,175,469
Мот. 27, 1979
199661 8/1975 Kelly etal. e. MI/IBE
3,899,975 8/1975 Lawrence 5... IMN/MAX
4983703) 10/1976 Matey ss # 819 X
4,063,315 12/1977 Schneider ct al ....... 102/35 CD
Primary Examiner —David И. Brown
Attorney, Agent, оғ Firm—Joseph Е. Rust; Jacob М.
[57] ABSTRACT
A centrifugal aerosol dispenser assembly capable of
dispersing a cloud of particulate aerosol] material іп а
predetermined ation, The dis-
penser assembly в formed of two parts, а mount and а
dispenser. An ejector mechanism having а portion
thereof on szid mount and a portion thereof ол said
dispeaser expels the dispenser from said moznt with а
spin motion. А plurality of dispensing compartments
cjection thereof releases its contents іп a predetermined
geometrical configuration duc to the centrifugal forces
ILA;
"m
1541 | POWDER CONTRAIL GENERATION
118 / 569
107 / 340
THE EMERGENCY BROADCAST SYSTEM.
- <>».
"10 / 570
FY 2018 Program Acquisition Costs by Weapon System
Evolved Expendable Launch Vehicle
The Evolved Expendable Launch Vehicle (EELV) теке
provides to the Air Force, Navy, and the d
National Reconnaissance Office (МКО),
and other government and commercial purchasers of
launch services medium to heavy lift class satellites. Falcon 9
* 70 consecutive successful national security space
М55) operational launches (as of March 19, 2017).
* The Air Force certified SpaceX as ап EELV provider
on May 19,2015.
Mission: Provides launch services and capability for medium
to heavy class national security space satellites.
FY 2018 Program: Procures three Air Force launch
services. All three are planned for competition and which
are usually ordered no-later-than 24 months prior to the
planned mission unless additional first time integration is
needed; funds EELV Launch Capability (ELC) effort
including mission assurance, program management,
systems engineering, integration of the space vehicle with
the launch vehicle, launch site and range operations, and
launch infrastructure maintenance and sustainment. о
Continues EELV launch service investment to provide GE Spa
two commercially-viable, domestically-sourced space
launch service providers with the objective of eliminating
reliance on a foreign-made liquid rocket engine.
Prime Contractors: United Launch Alliance (ULA); Centennial, CO
SpaceX; Hawthorne, СА "
0
1 ^ 6
пе ѕєраспеті
іле »pasBlictu
k4
пе
Sc ANCL) mme
B» ^L». ору
. ум тис
nr neural strin ayict ON THE OTHER SIDE and each ca
OT neural 5171 exist UN It UALR IDE, апа еасп са
Just think of a coin С) and see how easy it is to describe what! mean with "оп the other side". THIS SHI
GUSTAV NORSTROM. CONTRO!
20 / 569
www.restricteddocuments.com/1947-Photo-Look-at-the-mentalattack-dimensionalstring
Sit
е this im
1. To date. For us on Earth™.
age
age.
Embry, AnnMarie Oien, Duane D. Smith, J. Alex Thomson, James Pete Tucker &
Samel G. L. Williams - Assignee, Lockheed Martin Corp. & Lockheed Martin
Coherent Tech Inc. An imaging method and associated system for producing
high-resolution images. The method includes illuminating an object or scene with
coherent radiation such as beams from a laser and then, collecting scattered light
with a plurality of subapertures rather than a single large aperture. The method
continues with coherently detecting, such as with heterodyne detection, the
scattered light to measure the complex amplitude incident on each subaperture
and digitally reconstructing images from the coherently detected light for the
subapertures. Then digital co-phasing is performed on the subapertures using an
image sharpness or quality metric to form an image having the resolution of the
total subaperture area. The method may also include determining an aimpoint in
the formed image, calculating a phase screen, directing laser beams through the
subapertures towards the aimpoint, and co-phasing the laser beams by applying
the phase screen to form a single beam.
USA PATENT NUMBER: Onboard spy satellite.
US7405834
І د ha вия
t can be found
ong as 250-300 lometers before it snaps I !
_ | | Recommended actions: n it. And it is the cause ol
— — ұма a Ses 7А | Good filtered ventilation and cleaning with chlorine. half of all the medice
Yr изи. au UT к. | Eat central stimulants (raises your available brain energy). | pro blems.
https://restricteddocuments.com
122 7 570
https://restricteddocuments.com
г
126/578
To better combat ancient extraterrestrial pre-historic
bioweapons effects, please change the trapped AIR
... in all water tanks with a sterilizing GAS. / GN.
T Chlorine gas.
, E і ut di. ` + ug p<? 1 v 7 ` Е
г. к P с o 2.” < f i ч 4 | ч . Е " * s v1
| ; - Р 8 ^ y. ча є А | ` + N : ° > ` “Ж "1 570
ИИ SD
LD.
w € ت
1 Дуо
МТМ ato The! Bane
ШО ГАЛ E
44.,.%
o
9
d
ж
с
0
E
5
о
°
©
©
Ф
а
О
|
че
Ф
Е
0
£
£
“ұлы.
ANY
Aw А,
DOMUS
$. ^J.
42 2
SEE THE DIRT HERE. SO IT HAS MADE
м ISIMILAR STOPS HERE BEFORE.
=
FOOTPRINTS.
Mure HUNDREDS, BEFORE
ПТ GETS AS THIS.
HE ABOVE SPACESHIP
IMAGE AGAIN, TO SEE IF
OU CAN SPOT IT.
2
x а
"өү
OU CAN SEE THAT TIME е ae
HAS IT'S FOOTPRINT >
OO, ON THEIR
FOOTPRINTS. YOU CAN
15ЕЕ THIS HAS TAKEN
IMANY LANDINGS
O PRODUCE.
118/340 ee r https://restricteddocuments.com >
W 115.00616
ASSIGNMENT CODE
MAJTSEO 18
Coordinates are off.
ERB PROGRAM CODES Points to Nellis Air F. Base
"ҒОР BOOK" WORN ON ARM Las Vegas.
GALACTIC POSITIONING CODES)
ORIGIN OF P52 ORIONS ORIGIN OF P45 J-ROD'S
The Galactic Position image to the right has 5 "arms" from middle.
130 / 569 Same number 5 Arms, appears on Las Vegas UFO parking lot. 131/570
>
AAS
y
FROM ANOTHER CAMERA ANGLE..
ACTUALLY.
“А,
T LANGUAGE TALKS:
The most widely spoken
languages according to UNESCO
(UN Educational, Scientific and E | [ | | N PEO P | Е
Cultural Organization) are: ш
1. Mandarin Chinese.
2. English.
3. Spanish.
4. Hindi.
5. Arabic. т
6. Bengali.
A RSN —You know, the easy words, like, where is the restuarant'é?
8. Portuguese.
от эшени Holiaw iy the fifth most taught language in the world,
"T after English, French, Spanish and Germani
1зСоругіһ © The website at https://restricteddocuments.com/pro/ 123 / 340 136 / 570
Position Ukraine - the antenna points towards central Sweden. A nuclear power plant is
required to operate an attack antenna like this. It was 60 miles away. Chernobyl 1986. The
accident occurred on the night of Saturday, April 26, 1986 at 01.23.45, (local time) when
reactor four, on the outskirts of the city of Prypjat, was destroyed.
And this radio transmitter became powerless, in a radioactive area.
This ANTENNA was so powerful that it made 'click sounds' in
American telephone conversations, on the other side
of the Atlantic Ocean. It was operating at
a brain resonance frequency.
10 Hertz.
re
НЕТ -- -
raw
136 / 569
Чаво.
Position Ukraine - the antenna points towards central Sweden.
А nuclear power plant is required to operate an attack antenna
like this. It was 60 miles away. Chernobyl 1986. The accident
occurred on the night of Saturday, April 26, 1986 at 01.23.45,
(local time) when reactor four, on the outskirts of the city of
Prypjat, was destroyed.
And this radio transmitter became powerless,
in a radioactive Soviet Union (USSR) area.
"um
г
ане aT
»
AS Y
1 a а
7
LI
MAE
f
rand
а: А
!]
г
i -
Е жет
+; ! ж
= j T ж E т” А |
=” pe « | se \
š z - Р и
yo F LE : — : EP
ма №
РЕ
== чай. вы жы
| ы
Р E
à | i
4
i
ы
| Г
1 | =
— Fr
Be.
8
x
I»
к = % г
së L
ME H E
+
=
*
- = E
а, -" - |
» s г ва Е *—
= Е + га Ë a
ч — x Ре
r 1 i
z | |
“тщ IJ Ë
- . 1
--ж - — ë
4
1 і
i в. T
k | i |
= а ui T m = И T
4 1
= š! L
d 41]
| ]
ye ашыш
Ë
ч ағы
+
; Here MJ12 and the U.S. President discuss that it is okey to bend the
From the MAJCOM МЈ-12 Fifth Annual Report. law and the Constitution "considering the nature of the threat”.
Top Secret Document Report
A, Demestic and Censtitutienal Issues *** CLEAR VIOLATIONS OF THE LAW.
That's why they are Traitors today and uses
Traitor Technology without doubt.
recemd imdividual rights,
К. Secial, Religieus amd Scientific
It has been the downfall ef creat аааз amd cultures whem а mew
reality is mot readily accepted by the ni The seclal erdor was зетеге1у
ravaged by the last world war, with great damage te the religious derma ef
"earth withaut emi,” thus ar а government disclesure irresponsible and
imheremtly dongereus. The errs cemmunity would prod ictably questions >
such a reaction as а world suffering from a Buck Regers delerium and attack
anyone of their ewn ranks_for believing such famatay, Sciamem itself, may
undergo а traumatic transfermatien, with belief structures im shambles,
putting the institutiens under scrutiny by the leman, thus ereding алу
credibility, Seience would be left with an image of credulity, лвла $
CRIMINALS TALK LIKE THIS. 127 / 340 [ PLANETARY TREASON.] 39 / 570
Tele rona s `
дм
съ че ШТ:
`
| 2 DERE Ре ДЫ:
AMET m кала X а DSR Ме УА) ;
г. ك Ж > a" d ia
Ж“.
a,
nhe
Fita
— —M
q m dir
4 ALTUS E
я. чак ГОЛОТ. 1
A
URS
ج
Ba) 4
>;
P.
ма د нат + Š
рл:
a 41%
» n v
4 с жер B
[seus MEC
[TN
ғ
Б
Ы ei a
POUT V Ау
— 4 ++
и} N"
и g я ч m ши uma ши a "m ни an нин “ г
o
-
o
Ф
—
G
с»
>
1
o
70
Ф
=
je
o
ч—
-
А =
‚2
Ф
“-
o
Ф
iz
o
©)
G
=
S
c
©
>
Oo
©
со
E
а)
—
9
Co
жа
CG
—
“Бе
o
Ф
| =
—
u)
е
=
с
9
>
a
G
m
S
c
2
>,
ia
oO
са
ERE
c
9
>
с
(“9
со
ч
о
2
6
о.
o
[ud
4—
Ф
E
~
©
©
o
с
е
Ф
бы
-
и ма B. ди ав „н. ни чи "E ни ня ни
= ат: ‘BaS Se LI га a дн. 06 T “ааа =<.
, [4
ки | ан fL ЕС: На ROT BS Fr итш la. aM yor ТС - вижте РА РЕ”
жи шщ
н аи ки ми ищ " ч “ = и ни я > ща m uw чи ни ин ни ни ин ян на
е
©
=
&
>
а.
о
а.
o
s=
“.
o
к”,
Ф
=
о.
E
Ф
>
Ф
—
E
а.
Е
о
о
141 / 570
141 / 569
Sew зов FOR макутх JOS =
ROSWELE:
UNITED AND AP FEATURES табаға; CMAV ы» COUNTY, NEW MEXICO
y pe Debunks Roswell Flying Disk
As World Simmers With Excitement
Reds Blame . к
LS-Britain For Officers Say Disk |
Greek Situation 15 Weather Balloon
Russian Minister
Ses err Men, SHERIFF WILCOX TELL 5 THE LIMEYS OBJECT FOUND
re Causing Trouble 0% FOSTER RANCH
CAUSES EXCITEMENT
American Leaguers Eke 2-1 Thirteen Nations
Victory From National Stars Accept Bids To
QUU a a е ~ Коп Aid Talks
f oa lewis Miners | Still Hope That
реа Delum Торис | Kudeti pe.
With Fat Raises сет
league’) когу tare over
75 Pet. of the Workers 2727 ^
, Return But Southern «o
^ Operators Won't Sign ois
7 = ^ ‚ WASHINGTON за Г t Seaton
taxe av
кагу
And eto! the Firbid АМ Fere
WeadquaMu la Fori Werte за
fore’ ік. the бай жы Geta
Md жығу UNAM ә mieu дъна
we өйө سم ^ أا aghu
— «біз cedem merr lee
rere. am 1» жәғеті Бер.
жымы company тва Pee) handi-
me тайн ін өзге; Өк) тама
ranty — ыы D. Ae
be ж-
езе" after (е romaine were
mamini ia Ale Ferre nama
м”. ғы 19» Вы М. Матея
ma, (he злее тане 1344 مها
боғы. а +
1% THIS А FLYING DISC? сит e"
š Fran Kf sc ^
had pho* ty ы +
Awan унау, Press
Berta жола aiid
d Uus ебе تخا
red
* Yankees.
ghe (annual w n.
n iom fies
“ * er 4» by RAAF 03
aat 4% eere ú жаз жертану by Waters bi
І м. a Motors
Tax Slash ВШ — 7
Sails Thru House у 2 Š к, я
By Large Margin 2 sg ва ча SS,
seer ua
exe rk re Тре хом Тена іл New Мез
Fnomkh “Хес үйек) e E tr fiat EA ET X C
3 To Override Another SS, DEC пича
КУП any эл соо Vb Ub à Presidential Veto а и ife bum ac art merely are
quee (hm thee Dem as
Me am] Ww Chet F
"MASS
WASHINGTON, (m — The re
publ.) packed вое or eer ie-
же егіз Iur deme
каш cae а House Bafles стоса RT
miserie: QverDocument d ме
Оп Fascism Flying Disk Transforms Sheriff s
шеш ето Office To International Newsroom
eet Sox et Bevin Praises
т Senate Confirms
ә
2 Š Connally Man Over
O'Daniel Appointee
1
w & ipu сық” «жәе
wel «Гоу office or
Grange leader : Vis ei таа Делез mum ТТ
Proposes Ceilings : CUR 225 Marshall Plan ppp
On келердің Wage Sider evt x UL ED
папа „ЗАО СЕРДА рис
< seta беса» Chee QU the du Бая а Kir, mom:
* 3945 сорта” и
ex ЕТТІ Carrizozo Man
е Sees Flying Disk
з» с. CANRIZX APO г--Мы% sim
wet
stormave ^ ^ ^e
ож»
ere eom. mis Joe Massey Spois
riot eh rms Disk Over Roswell
on Aur -
sede betwee 4494 ned алет
s. E RAAF Take 16-0
а watt ict eider ден теч Win From Sportsman wat лаш
#1 Ge Том «жоғы Che @ s
almay owed етт Не Denies із
93264 iru мееее» > Rarer ^
1947-The Newspaper Roswell Morning Dispatch's front-page the day after,
the USA Presidential Order of a Military Cover-up already had been
administrated. July 9:th 1947.
130 / 340
144 / 569
Photo from Planet Mars. See the shadow here.
is
сл
Wonders of Universe
January 5 at 10:03 PM "434
This volcano mountain is on Mars. It is called Olympus Mons. It is the tallest mountain in our
solar system. It is three times larger than Mount Everest ( 26 km long and 600 km wide
Amazing.
D Jeremy Brown
Great pic. Funny how we get blurry moon pics but super hd mars pics.
—] think it looks like a downed or crashed flying
saucer, that has been through some sand
storms, on Planet Mars.
Perhaps it has been there since ancient times.
146 / 569 е
x
Ф
=
е
=
P
°
1
HIGH FIVE
ON LAST PAGE: ALIEN POETRY AND WISDOM.
Three truths and realities we must accept:
1/ We are all one of the same kind.
2/ We are all Gods inside.
3/ We are all unique and special.
It believes itself to be our Creator.
136 /34&
Here I Пе and control] the future, as
you see. I am your father. We can
rule the galaxy together. HIGH
FIVE! wrew.alien|947.com
Time is an illusion.
The only thing that matters is the here and now.
Not the past.
Not the future.
Time is an illusion.
[You control the present]therefore you control the
you control the future. Your future.
past, therefore
CY y wx SI
diei p `
| 0 Ке | 1
- 1 П
7 A | 2
- : | ;
М I 1 I | А |
Y | ç | iP /
N / /% " N у /
AN aiv VUE г» ES" ب
` / 5
N / Ж
Wf
U.S. Department of Defense
148 / 569 137 / 340 148 / 570
«СО.
149 / 569 138 / 340 149 / 570
Wig
N аР, PUn А A
) қалап SOF AN
k ; 9 "ака ” у A 3 к
a Y Q 7 7 % Ж /
` Qe. М, w
AN Was. о:
ОМ МЕХТ РАСЕ:
—PERHAPS A EXTRATERRESTRIAL WEAPON.
THE SUN'S ARRAYS WOULD SPREAD ITS LIGHT ARRAYS
WIDER THAN THIS LIGHT BEAM, IF THEY TRAVELED
AS ON IMAGE.
150 / 569 150/570
151 / 570
N
N
N
^ “>
2/57
152 / 569 | B
N
N
N
^ “>
1 70
153 / 569 7
TYPES OF RADAR
Primary Radar Secondary Radar
Patent No.: US 6,470,214 B1
Date of Patent: Oct. 22, 2002
METHOD AND DEVICE FOR
IMPLEMENTING THE RADIO FREQUENCY
HEARING EFFECT
Inventors: James Р. O'Loughlin, Placitas; Diana
L. Loree, Albuquerque, both of NM
(US)
Assignee: The United States of America as
represented by the Secretary of the
Air Force, Washington, DC (US)
AM Modulation with Fully Suppressed Carrier for
the Intelligible Encoding of Speech by the
Invention for Compatibility with the RF Hearing
Phenomena
The equation for AM modulation with a fully suppressed
carrier is given by equation (10), below:
Иж (о t)
е жың ” 123 /570
PDF SECTION:
UNITED STATES PATENTS.
155 / 569
United States Patent 9
Mardirossian
[54] COMMUNICATION SYSTEM AND METHOD
INCLUDING BRAIN WAVE ANALYSIS AND/
OR USE OF BRAIN ACTIVITY
[75] Inventor:
Aris Mardirossian, Germantown, Md.
[73] Assignee: Technology Patents, LIC, Derwood,
Md.
[21] Appl. No.: 09/206,365
[22] Filed: Dee. 7, 1998
[51] MEGI ete ee AGIN 5/00
[52] US e аа RARO 600/544; 600/545
[53] Field of Search sss 600/300, 544—545;
128/897-898, 904, 905
[56] References Cited
U.S. РАТЕМТ DOCUMENTS
5,059,814 10/1991 Mead eL al. .
5,118,006 — 6/1992 Lynch ct al. .
5,136,687 — 8/1992 Гаспар ct al. .
5,224,203 6/1993 Skeirik .
3,303,703 — 4/1994 Nenov.
5,325,862 7/1994 Lewis ctal..
5,461,699 10/1995 Arbabi et al. .
5,522,863 06/1996 Spano el al. .
77
—
C 3
TRANSMITTER
3
US006011991A
6.011,991
111] Patent Number:
[4] Date of Patent:
6/1997 Skeirik .
2/1998 Laupel.
2/1998 Gonzales .
3/1998. ВТО oca etes deerit 128/905
3/1998 Itil ct al. 600/544
4/1998 Rogers ct al. .
451998 Flanagan et al. .
3/1998 Lynch ct al. .
5,791,342 8/1998 Woodard ................................. 600/544
5,816,247 10/1998 Maynard .
5,640,493
Primary Examiner—Cary O'Connor
Assistant Examiner—Michacl Astorino
Attorney, Agent, or Firm—Joscph А. Rhoa
[57] ABSTRACT
А system and method for enabling human beings to com-
municate by way of their monitored brain activity. The brain
activity of an individual is monitored and transmitted to a
remote location (c.g. by satellite), At the remote location, the
monitored brain activity is compared with pre-recorded
normalized brain activity curves, waveforms, or patterus 10
determine if a match or substantial match is found. If such
a match is found, thea the computer at Ше remote location
determines that Ше individual was attempting to communi-
cale Ше word, phrase, or thought corresponding to the
maiched stored normalized signal.
8 Claims, 3 Drawing Sheets
HOM
19
!
27
UNER 3ر
!
= — 43
AMPLIFIER -QuailzFR |,/29
Г 45
pue "v^
ANALOG SIG. | осморисатов T
ا 2-3
PARALEL TT
SERIAL CONVCETFR
р Ж .س 236
NEUTRAL DZIN-ER.£AVER 7
NETWORK
ANALYSIS |. pamm
COMPL ER | DECODER T
ud u
_ DESCRAM3I ER
— ЖӘНЕ cola
DIG. ESTIMATE
143 / 340
Jan. 4, 2000
155 / 570
U.S. Patent Jan. 4, 2000 Sheet 1 of 3 6,011,991
ANALOG SIC.
PARALLEL TO
SERIAL. CONVERTER
NEUTRAL
NETWORK
ANALYSIS
COMPUTER
156 / 569 144 / 340 156 / 570
U.S. Patent Jan. 4, 2000 Shect 2 of 3 6,011,991
rio. 2
INPUT
d
51
DISPLAY PROCESSOR
STORAGE OF
MANY INDIVIDUAL'S
55
COMPARATOR
RESPONSES we
57
НО. 3(a) FIG, 22
JOE (NO) JOE (YES)
157 / 569 145 / 340 157 / 570
U.S. Patent Jan. 4, 2000 Shect 3 of 3 6,011,991
FIG. 3(c) FIG. 3(d)
FIG. 3(e) FIG. 3(f)
Afr чый»
158 / 569 146 / 340 158 / 57
159 / 569
6,011,991
1
COMMUNICATION SYSTEM AND METHOD
INCLUDING BRAIN WAVE ANALYSIS AND/
OR USE OF BRAIN ACTIVITY
This invention relates to a system and method for
enabling human beings to communicate with one another by
monitoring brain activity. Іп particular, this invention relates
10 such a system and method where brain activity of a
particular individual is monitored and transmitted in а
2
toring the firing of one or шөге brain nodes or synapse
type members) on the first human being;
detecting brain activity of the first human being using the
at least one sensor, and transmitting the detected brain
activity to the satellite as a signal including brain
activity information;
the satellite sending a signal including the brain activity
information lo the second location;
a receiver al the second location receiving the signal from
wircless manner (с.р. via satellite) from the location of the 10 ihe salellite a Me M UE жаққан
rois - ; a he satellite and forwarding Ше brain activity informa-
individual to a remote location so that the brain activity can tion in the signal to the computer;
be сотршег analyzed аі Ше remote location thereby : M : UM 2 . .
enabling Ше computer and/or individuals ai the remote comparing, the received brain activity information of the
location to determine what the monitored individual was first human being with normalized or averaged brain
thinking or wishing то communicate. 15 aclivily information relating to the first human being
In certain embodiments this invention relates to the from memory; and | |
analysis of brain waves or brain activity, and/or 10 the determining whether the first human being was attempting
remote firing of select brain nodes in order 10 produce a to communicate particular words, phrases or thoughts,
predetermined «Несі on an individual. based upon the comparing of the received brain activity
20 information to the information from memory.
BACKGROUND OF PHL INVENTION In certain embodiments, the invention includes the Tol-
[Lis known to monitor brain activity by way of electro- lowing step: asking the first human being a plurality of
encephalograph (LEG) methods, magnetoencephalograph questions and recording brain activity of the first
(MEG) methods, and the like. For example, sec U.S. Pat. human being responsive to the plurality of questions in
Nos. 5,816,247 and 5,325,862, the disclosures of which arc. 25 the process of developing said normalized or averaged
both hereby incorporated herein by reference. As discussed brain activity inlormatiou relating to the first human
in the '247 patent, an LLG may be recorded from a number being stored in the memory. A database їп а memory
of pairs of scalp electrodes and processed according to may include, for cach of a plurality (c.g. onc hundred
known software. Such software and/or hardware acquires or thousands) of individuals, a number of prerecorded
both processed and unprocessed EEG data and may record 20 files each corresponding 10 a particular thought, attempt
попа disk. l'he records may be replayed and statistics of the lo communicate a word, attempt to communicate a
on-line measures made on suilable sections placed in cal- phrase or thought, or mental state. Measured brain
egories predefined by a user. This may utilize Ше form of activity of a given individual may be compared to files
database of statistical measures of brain activity. from that database of that individual to determine what
Unfortunately, neither the *862 nor the "247 patents disclose 35 the individual is attempting to communicate or what
or suggest any methods by which humans can communicate type of mental state the individual is in.
with one another by way of monitoring brain activity. In certain embodiments, the plurality of questions are the
U.S. Pat. No. 5,719,561 discloses а communications same question. | . . |
device and method, the entire disclosure of the "561 patent In PPM bodiments, the plurality of questions arc
hereby being incorporated herein by reference. The 7561 29 different questions. | . 2, Е
patent discusses a method and device for vibromechanical In certain embodimen ts, the invention includes the мер ol
lactile communications adaptable lor use by individuals to normalizing or averaging recorded brain activity responsive
recognize alpha numeric messages in a language or in other toa given qu estion or set of questions mn developing the
symbols known to them. The “561 patent discusses using, a normalized or averaged brain activity information relating to
series of sequentially firing vibromcchanical stimulators 45 he first human being. | | EE
vibraling agaiusl а suitably tactile sensitive surface of the It 1s an object ol this туепйо to enable brain activily ol
wearer (e.g. skin) to induce a phenomenon of illustration of a first human being to be monitor ed, with the activity being
lincar continuity. Unfortunately, the 561 patent requires the transmitted to a remote location so that individuals and/or a
use of burdensome and complex vibromechanical tactile сотршег at Ihe remole location can determine what the first
devices, and is not suitable for long distance communica- 50 human being was thinking or intending 10 communicate, In
пот Ë such a manner, human beings can communicate with one
[Lis a purpose of this invention to address any or all of the 5 : ia monitoring or brain activity, and transmission о?
above-identificd problems in the prior art, as well as other р Аш: her obiect ol this i | | T
problems which will become apparent to the skilled artisan _ EN E id ji ect ا lo =
from the following detailed description of this invention. 55 monitored brain activity from one location lo another in a
v wireless manner, such as by IR, RF, or satellite.
SUMMARY OF THE INVENTION It is another object of this invention to provide а system
ЕД "T D a із ғар құт ч 5 capable of identifying particular nodes іп an individual's
кол оз 2... brain, the firings of which affect characteristics such as
Eus 5 е ас. $0 appetite, hunger, thirst, communication skills (e.g. which
municating comprising the steps of: ее Ë Pepe
DER : I Е nodes are utilized to communicate certain words such as
providing a first human being at a first location; “уса”, “no”, or phrases such as “I don't know", “I'm not
providing a compuler al a second location that is remote sure", or numbers such as “one”, “iwo”, "ten", “one hun-
Irom the first location; dred” and the like), thought processes, depression, and ihe
providing a satellite; $5 like). When such nodes are identified, they may be specili-
providing at lcast one sensor (preferably a plurality—c.g. cally monitored by onc or more sensors to analyze behavior
tens, hundreds, or thousands, with cach sensor moni- or communication or words, phrases, or thoughts. In other
147 / 340
159 / 570
160 / 569
6,011,991
3
embodiments, devices mounted to the person (c.g. under-
neath ihe scalp) may be energized in a predetermined
manner or sequence to remotely cause particular identified
brain node(s) to be fired in order to cause a predetermined
feeling or reaction in the individual, such as lack of hunger,
lack or depression, lack or thirst, lack of aggression, lack of
alzheimer's disease effects, or the like.
Brain node firings are the basis of thought and mind
processes of individuals. Certain embodiments of this inven-
4
network techniques, for the purpose of receiving the moni-
lored brain activity signals, transforming the signals into
useful lorms, training and testing the neural network to
distinguish particular forms and patterns of physiological
activity generated in the brain of the monitored individual,
and/or comparing the received monitored brain activity
information with stored information relating to that indi-
vidual in order to determine what the individual is attempt-
ing to communicate.
tion enable such brain firings and behavior to be captured by 15 This invention further fulfills the above described needs іп
an external device. It is an object of this invention to utilize the art by providing a method of affecting a mental or
a normalization or normalizing curve (or wavelorm or physiological state of an individual, the method comprising
paltem) based upon monitored brain аспуйу to detect or the steps of:
determine thought processes by the monitored individual. In providing at least one firing device capable of being
such a manner, individuals can transmit. by satellite what 18 energized on an individual; and
they are thinking or intending 10 think via their monitored energizing the firing device to cause the firing device to
brain activity, without the need to talk or write down cause a particular or group of brain nodes to be fired in
information. . "" T Ж the individual in order to allect the menial ог physi-
Each individual has a distinct pattern of brain node firings ological state of the individual.
= brain activity. Each person is believed to be different in 20 In certain embodiments, the method including the step of
Unis regard. Thus, а separale brain activily file may be stored providing the at least onc firing device on or under the scalp
Лео [бг ш individual, ids analyzed Mace pared of the individual in proximity of the brain of the individual.
to received brain activity from the monitored individual in In certain embodiments, the method including the step of
order to determine what that individual is thinking oc identifying at least one brain node related to the mental or
ацешриар to communicate... T š — E physiological state intended to be affected, targeting the
It is an object of this invention to utilize brain monitoring identified brain пос, and energizing the firing, device or
and transmission of monitored brain activity for lie detection devices to cause Ihe identified прав to be fired ir order 1o
and/or human communication. . . . affect the mental or physiological state of the individual.
It is another object of this Invention to formulate or In certain embodiments, the method is utilized to cause
build-up a file lor each individual based upon pallens 30 the individual to be one of less hungry, less thirsty, less
recorded in response lo that individual answering or anxious, and less depressed.
responding № numerous predetermined questions with In certain embodiments, Ше remote node firing devices
known intended responses. Subsequently, monitored brain are electrically energized and generate electromagnetic
activity from that individual my then be compared to waves which cause a plurality of brain nodes to Бе fired.
information stored corresponding lo ша individual lo deter- 35 Тр invention will now be described with respect to
sa is - the и E ч mg die m 2 certain embodiments thereof, along with reference то the
is intending to communicate in the monitored brain activily. AR Иек i eee ЖИ
Thc cipher’ the level of detail of the file, the higher the қа ЗЕ Пон
of potential communication by certain embodiments of this IN THE DRAWINGS
invention. 40)
AL least one sensor on the scalp or skin iu certain 116. 1 is а block diagram illustrating the system and
embodiments provides signals representative of physiologi- method according to a first embodiment of this invention.
cal activity generated in the brain of a monitored individual. FIG. 2 is a block diagram illustrating the neural network
A data acquisition device receives the signals representative inclusive computer of the FIG. 1 embodiment of this inven-
of the physiological activitly generated in Ше monitored 45 (оп.
brain, and transforms the signals into a pattern OU GUIS: 1168. 3(a)-3(f) are exemplary graphs of monitored brain
corresponding, to the monitored brain activity. This is then activity of different individuals, with, lor example, FIG. 3(a)
transmitted (c.g. by satellite) то a computer located ага illustrating monitored brain activity of a particular indi-
remote location, with the monitored brain activity райетп or vidual who is attempting to communicate the word "no" and
curve being stored in a memory at the remote location. lhe 50 PIG. З(Б) illustrating monitored brain activity of the same
computer then causes the received pattern or curve inlor- individual when that individual is attempting to communi-
mation to be compared with stored brain activity pattern cale the word “ves.”
information rclating to the monitored individual in order to I
determine (a) whether the monitored individual is lying іп DETAILED DESCRIPTION OF CERTAIN
response 10 a particular question, or (b) what the monitored 55 EMBODIMENTS OL THIS INVENTION
individual is communicating or attempting to communicate.
Another object of this invention is to utilize normalization Referring now more particularly to the accompanying
curves representative of received brain activity patterns from drawings in which like reference numerals indicate like parts
the monitored individual, and to compare the received throughout the several views.
normalized data with normalized brain activity pattern or 60 here are significant individual differences in electrical
curve data stored in memory relating to that individual. The and magnetic activity in the brain. Brain node or synapse
usc of normalization curves in one or both of the individual's firings arc chemically and/or electrically caused and/or
file and received brain activity improves reliability, related. Some characteristics of brain activily may be rela-
accuracy, and efficiency. lively stable when measured from day to day. Brain
In certain embodiments of this invention, the compuler 65 responses lo sensory stimulation (e.g. visual, audible,
located at the remote location includes a neural nctwork olfactory, gustatory, ctc.) as well as higher order cognitive
suitably programmed in accordance with known ncural processing (c.g. decision-making or thought/word
148 / 340
160 / 570
161 / 569
6,011,991
5
communication), can be examined in great detail using а
variely of recording procedures. А recording of brain elec-
trical activily is called an electroencephalograph (EEG), and
а comparable record of magnetic activity is called a mag-
nctoenccphalogram (MEG). When human sensory systems
are stimulated by a particular event (a given sound or optical
ellect) or when a human wishes to communicate a particular
word or phrase (c.g. Ше word “yes” or the word “по?), there
is a predictable sequence of processing that occurs in the
brain. This processing generates an event related potential
6
offers a method for finding complex, поп-Шасағ relation-
ships in large dala sels, even when the nature of the
relationships is поі known in advance. Neural network
technology is implemented sometimes using computer soft-
ware programs, but may also be hardware implemented.
Neural network theory, and detailed descriptions of specific
techniques, are available in numerous books and articles set
forth in the aforcsaid '862 patent, as well as in, for example,
any of U.S. Pat. Nos. 5,136,687; 5,059,814; 5,461,699;
5,737 485; 5,224,203; and 5,640,493, the entire disclosures
that can be recorded from the scalp beginning shortly after ü of which are all hereby incorporated herein by reference.
the onset of the stimulation, and lasting Гог approximately Such neural computing systems have a capability to learn
0.5-4 seconds after the stimulation. These potentials сап be features of data scts and classify same into cither unknown
cepeatedly generated from individuals given the same stimu- or predetermined categories. A variety of neural network
lus or wishing to communicate the same word or phrase. Іп |, techniques may be ulilived to classify event related
cerlain embodiments of this invention, brain activity may be potentials, evoke fields, or any other type of pattern corre-
repeatedly sampled, and response patterns averaged by way sponding to monitored brain behavior. Іп most. neural
of a normalization curve or the like. Comparable recordings networks, input values are adjusted through a series of layers
of averaged or normalized magnetic activity may be referred by а series of transforms and weighted so that output
to as evoked fields. Neuroeleciric and neuormagnetic 4, calegories are correctly predicted. Thus, а neural computing
recordings are subsets of general measurings referred to as system herein may be utilized 10 receive monitored brain
biocleetric and biomagnetic measures, These measures refer activity and based upon predetermined stored and/or learned
to recordings which may be made from different types of information, determine based upon the received information
tissue including neural, muscle, heart, ete. For example, what word, phrase, or thoughts the monitored individual is
LLG, evoked potentials (EP), MEG, position emission 4; allempting to communicate. In such a manner, the monitor-
tomography (PET) of glucose, or single photon emission ing of brain activily may be utilized to allow individuals to
computed tomography (SPECT) may be used to monitor communicate from onc location to another, with the ncural
brain activity in different embodiments of this invention. computer or апу other турс of computer analyzing thc
Event related potentials have been shown to be stable and monitored brain information (e.g. via comparison with pre-
unique lo individuals. See U.S. Pal. No. 5,325,862, which is 3, viously recorded brain activity of that person) and outputting
incorporated herein by reference. Although Ше actual shape information indicative of the word, phrase, or thoughts
of such potentials varics considerably from individual to which Ше monitored individual is attempting to communi-
individual, there is stability within individuals over time for cate,
individual wavelorms. Sources of these potentials and varia- 116. 1 illustrates a particular monitored individual 3
tions thereof include individual differences in brain anatomy 55 according to an embodiment of this invention. Individual 3
and dillerences in the way in which information is processed includes a head 5. As illustrated, sensors 7 may be attached
by cach individual. Thus, it is feasible hercin to utilize or otherwise disposed adjacent to the scalp or skin of the
monitored brain waveforms for the purpose of determining individual 3. Sensors 7 detect and monitor brain activity of
whether an individual is lying or not, or what word or phrase individual 3. Sensors 7 can detect event related potentials
a particular individual is altempting to communicate ao and/or event related fields (i.e. ERPs ог ERIS). Optionally,
(without the need for writine information down or sensor 7 may bc utilized to detect any other tvpe of *brain-
speaking). print” indicative of brain activity of individual 3.
Thus, evoked fields and/or event related potentials сап be The monitored *brainprint" of individual 3 is forwarded
ulilized as classifiers for several purposes. l'or example, іо a small transmitter 9 which is preferably embedded in the
because these potentials and/or fields are relatively unique іо 45 skin of individual 3, or in close proximity to individual 3.
individuals, an individual's evoked field or event related ‘Transmitter 9 causes the monitored "brainprint" information
potential (or brainprint) can be utilized to determine what detected by sensor 7 to be transmitted by way of antenna 11
thoughts an individual is communicating or attempting to as wireless signals 13. In certain embodiments of this
communicate given knowledge of the identification of that invention, signals 13 propagate through atmospheric Пее
individual and previously recorded patterns associated with 50 space in the form of uplink satellite signals toward satellite
that individual communicating predetermined wards, 15. Satellite 15 receives signals 13 and then redirects those
phrases or thoughts. Because there is a remarkable degree of signals back toward Earth as signals 17 which include
stability in individual waveforms of a person over time, it is information thercin (analog or digital) indicative of the
possible to identify changes in individual event related monitored brain activity of individual 3. Signals 17 are
potentials and evoked field patterns which сап be utilized to 55 received by antenna 19. Antenna 19 and individual 3 are
determine when an individual is lying, or impaired in апу both preferably located on Earth at different locations. In
way. certain embodiments, antenna 19 is located at a location
There arc numerous neural networks in the brain, these remote [rom individual 3. l'or example, individual 3, sensor
networks having complex inner connections and non-linear 7, transmitter 9, and antenna 11 may all be located in Lurope
response patterns. Relationships between the latencies and 60 while receiving antenna 19 and computer 21 may be located
amplitudes of event related potentials and evoked field іп the United States.
waveform features have become well understood. In FIG. 1 illustrates both a digital embodiment 23 and ao
addition, there are many individual variations in waveform analog embodiment 25 of receiving systems. Ширег may be
morphology. Computing techniques modeled after brain utilized. When signals 17 include digital information, they
neural functions are known iu Ше arl. They аге typically 65 are received by antenna 19 and forwarded 10 tuner 27. ‘The
referred to as neural network analysis techniques or com- signals are processed through equalizer 29, demodulator 31,
puters. Neural octwork analysis computing technology parallel to serial converter 33, deinterleaver 35, decoder 37,
149 / 340
161 /570
162 / 569
6,011,991
7
descrambler 39, digital cstimator 41, and finally to ncural
network analysis or other type of computer 21. Monitored
finngs of brain nodes may be broken down into digital form
(c.g. the firing of a node is equivalent to а "1" and nonfiring
to a “07). These 15 and Os, which are digital, тау be
modulated onto a carrier and then transmitted to Ше satellite
so that the monitored brain activity in the signal is m digital
form. When the computer receives this monitored signal
from Ше satellite, the demodulating system analvzes thc
received digital information (c.g. 1s and 05) which is indica-
tA
8
would be stored in memory 57, cach corresponding to a
particular individual. A normalized curve, waveform, or
pattern may be developed by repeatedly asking an individual
tens, hundreds, or thousands of times a particular question or
group of questions which evoke a known response such as
“I don't know,” or "no" or “yes.” Each time the response is
made, a curve, wavelorm, or a palleru is recorded. Alter
tens, hundreds, or сусп thousands of these patterns have
been recorded, a normalized curve, waveform or pattern is
formed based upon same so as to be indicative of that
tive of the firing of select brain nodes of the monitored > particular individual's attempt to communicate the phrase.
individual. ‘These digital signals may be transformed, in In a similar manner, if it is desired to store normalized
certain embodiments, into analog form similar to the illus- curves, waveforms, or patterns for ten different words,
trations of FIG. 3, or alternatively may be kept in digital phrases or thoughts communicated by a particular
form and compared with prestored digital signals to deler- |; individual, then a normalized curve, wavelorm, or pattern is
mine what the monitored person was intending to commu- developed lor each of the different ten items so that ten
uicale. different normalized curves, wavelorms or райетп are
In analog embodiments, signal 17 is reccived bv antenna stored in memory 57 for that individual and classified
19, and the information forwarded to tuner 27, amplifier 43, accordingly. Thus, when computer 21 receives signals indi-
and the analog information inclusive sign al 45 is lorwarded 2 caling brain aclivily from that monitored individual, the
to computer 21. In analog embodiments, the signals received received signals are compared by device 55 10 Ше ten
by Ше monitoring sensors are in the form of waves similar different normalized signals in memory 57 in order to
to those shown іп FIG. 3 hercin. determine what the individual is attempting to communicate.
FIG, 2 is а block diagram of computer 21 in certain FIGS. 3(@)-3(f) illustrate different normalized curves
embodiments of this invention. Ге input thereto may be їп 25 which may be stored in memory 57. PIG. 3(и) shows а
either analog or digital form. Computer 21 includes proces- normalized curve indicative of individual “Joe” attempting
sor 51, RAM 53, comparing device 55, and memory 57 lor to communicate the word “по.” FIG. 3(5) shows a normal-
storing a plurality of files or patterns of measured brain | ized curve indicative of individual "Joc" attempting то
activity or responses of particular individuals. For example, communicate the word “yes.” FIG. 3(c) shows a normalized
memorv or storage 57 тау include one file for individual X 5) curve indicative of another individual "Steve" allem pling lo
which includes hundreds of monitored brain activity (e.g. communicate Ше word “по”, while С. Жа) shows а
ERPs or ERFs) that were measured when individual X was normalized curve indicative of individual "Steve" attempt-
attempting to communicate the word “no.” Another file in ing to communicate the word “yes.” Finally, FIG. Ме) shows
storage or memory 57 may have stored therein hundreds or a normalized curve indicative of still another individual
thousands of monitored brain patterns or activities of iudi- 35 "Anita" allempting to communicate the word “no”, while
vidual X when individual X was allempting to communicate VIG. 3(f) illustrates a normalized curve of "Anita" attempt-
Ше word “yes.” Storage or memory 57 may also include ing to communicate the word “yes.”
similar files for individual X including patterns which were Thus, if computer 21 receives a signal including moni-
measured when the individual was attempting to communi- tored brain information identified as being from individual
cate different words or phrases. Lach of these files may have 40 "Steve", then computer 21 causes the received signal to be
a normalized curve, waveform or pattern formed or devel- compared Бу device 55 with the normalized curves ог
oped for cach word, phrase, or thought for cach individual, waveforms shown in FIGS. 3(c) and Xd) and all others
based upon all of the recorded patterns or curves for that normalized stored signals of “Steve.” Ша match or a close
word, phrase, or thought (e.g. 1,000 such recordings lor the maich is found between Ше received monitored signal and
phrase "help me," and 1,000 for the phrase “Сме been 45 the normalized curve of PIG. 3(c), then the computer
caught." Memory 57 Ішіһег includes іп certain embodi- determines that “Steve” was attempting to communicate Ше
ments many different files for many different individuals, all word “no.” Meanwhile, if no match is found with the
including files for cach individual's past communicating of normalized curve of FIG. (с), but a match or a substantial
particular words, phrases, or thoughts. maich is found with regard to the normalized curve or
Normalized curves or pallerns corresponding to each so waveform of FIG. Жа), then the computer determines that
individual's аПетар to communicate a particular word, “Steve™ was attempting to communicate the word “yes.” If
thought, or a pattern may be stored in storage or memory 57. no match is found between the received “Steve” signal and
Thus, for individual X attempting to communicate the word any normalized curve or waveform of cither FIG. 3(c) or
*no", a normalized curve, wavelorm, or a рапет may be FIG. Ха), or with any other normalized curve stored iu
stored in memory 57 indicative or such a communication. 55 memory 57 corresponding io “Steve”, then the computer
Likewise, a normalized curve, waveform, or pattern may be determines that it is unclear what “Steve” was attempting to
stored in memory 57 for individual Y attempting to com- communicate.
municate the word “no” and another distinct normalized Thus, different embodiments of this invention may be
curve, waveform, or райетп may be stored in memory 57 Гог utilized 10 help individuals communicate with one another
individual Y attempting to communicate the word “yes.” In 60 without having to send laxes, make telephone calls, speak,
а similar manner, a normalized curve, waveform or pattern or the like. For instance, military personnel located in the
may be stored in memory 37 for individual Y attempting to Middle East or Europe can communicate with superiors in
communicate the phrase "I don't know" or “Pm not sure.” the Pentagon, simply by use of monitored brain activity
Thus, if one hundred dillerent human beings have files in being transmitted by satellite to the Pentagon. Alternatively,
memory 57 corresponding to each of these individual's 65 а special operations individual (e.g. a spy) located in Europe
attempt to communicate the phrase “I don’t know’, then one could be asked a question by way of a telephone call, fax, or
hundred different normalized waveforms, curves or patterns the like, and that individual can respond to that question
150 / 340
162 / 570
163 / 569
6,011,991
9
simply by thinking the answer so that that individual's
monitored brain activity which is transmitted back 10 the
United States can be analyzed to determine the individual's
response. In further embodiments of this invention, twoway
human communication is possible, provided that human
beings at both locations have equipment capable of analyz-
ing and monitoring received monitored brain activity. In
such a manner, individuals at two remote locations may
communicate with one another without cither individual
having to speak a word, write anything down, or the like.
t^
10
brain sensors and/or firing devices to identify which brain
nodes are responsible lor which types of physical or mental
behavior, and then the computer transmits firing instructions
to the firing devices for those nodes to cause them lo be fired
in a predetermined manner to cffeer such physical or mental
behavior.
Once given the above disclosure, many other leatures,
modifications, and improvemenis will become apparent 10
the skilled artisan. Such other features, modifications, and
: р 1) improvements аге, therefore, considered to be а part of this
In other embodiments, devices mounted to the person invention, the scope of which is to be determined by the
(e.g. underneath the scalp) may be energized in a predeter- following claims. :
mined manner or sequence lo remolely cause particular І claim:
identified brain node(s) то bc fired in order то cause а 1. A method of communicating comprising the steps ol:
predetermined feeling or reaction in the individual, such as 15 providing a first human being at a first location;
lack of hunger, lack or depression, lack or thirst, lack of Slee 5 ; d
aggression, lack оГ alzheimer's disease elects, or the like. 1n providing а computer at Е second location that is remote
ап example of such an embodiment, the sensors may be from tho first location;
replaced with remote firing devices. The computer may providing a satellite;
cause satellite signals to be sent то а receiver on or proximate 20 Providing at least oue sensor оп the first human being;
an individual, which receiver forwards instructions to the detecting brain activity of the first human being using Ше
remote firing devices that are mounted, e.g. under the scalp al least one seusor, and transmitting the detected brain
of the individual, in order to selectively cause same to fire activity to the satellite as a signal including brain
or be energized. Such energizing of the deviec(s) under or activity information;
near the scalp in a predetermined manner tend 10 cause 25 the satellite sending a signal including the brain activity
identified brain nodes to fire a predetermined number of information to the second location;
times. This is useful, for example, in the following scenarios. a receiver al the second location receiving Ше signal from
For example, the system can be used to identify which brain the satellite and forwarding the brain activity informa-
nodc(s) in a particular individual arc typically fired causing, tion in the signal to the computer;
ша individual to not be hungry. If that individual has ап 50 comparing thc pinum brain activity information o t'ihe
eating disorder or problems with obesity, then the firing tirer human beins әлін normalized- сг avoraeod brain
devices сап be remotely enerpized thereby causing the gto a. пре | = .
identified brain node(s) to be fired at predetermined or аспуйу information relating to the first human being
random times in order to cause the individual to not be Tom E and š : :
hungry (even il the individual has not eaten for several hours 55 determining whether the first human being was attempliug
or several days). to communicate particular words, phrases or thoughts,
Іп a similar manner, brain nodes which cause an indi- ms upon the үн ши ا brain activity
vidual to be jovial or not depressed can be identified, and 2 if 2. iP p % Е ai ud : cde heh а
caused to be remotely fired by the computer and firing Е ле method of claim 1, further including the following
devices 7 mounted under the scalp in а predetermined 40 Sepe i : А А :
manner or sequence(s) in order to minimize or prevent asking the first human being a plurality of questions and
depression of the individual. This may eliminate the need for recording brain activity of the š first human being
drugs such a Prozac. Alternatively, such drug(s) may be responsive to the plurality of questions in the process ol
administered after such remote node firings, and the nodes develop me said normalized or averaged PISIS SIDE
al issue thereafter being monitored as discussed above and 45 information relating to thc first human being stored in
a biofeedback being perl'ormed to determine the effective- Ше memory. . А : . I
ness of the drue(s) or alternatively to enable а system to be 5. The method of claim 2, wherein the plurality of
utilized combining drug treatment with remote node firings questions are (he same q uestram я Р А
to more ellectively prevent or minimize depression of the 4. те method of claim 2, wherein the plurality ol
individual. Thus, the biofeedback may enable the identified. 50 questions arc differ cat questions. " |
nodes to be fired by the firing devices and/or drug treatment 5. Тіс method of claim 2, further nag air the step, of
at the proper level to most efficiently treat the disease, illness normalizin g or averaging recorded brain aclivily responsive
or state. This invention, including remote firings and/or lo a given question or sel of questions in developing the
monitoring, is nol limited to these examples, and ils poten- normalized or averaged brain activity mlormation relating to
па! uses are almost endless. Brain node firings сап be 55 thc first human being, — : . р
remotely controlled in a predetermined manner or sequence 6. Amethod of сопуга words Hom a first location
(s) (even random or sequential) to reduce, minimize, or lo a second location, the method comprising ше steps of:
eliminate undesirable behavior or mental characteristics. providing a first human being al the first location;
This may eliminate or reduce the need for burdensome drug providing a compuler al the second location thal is remote
treatments and the like. Brain node firings of а normal 60 from the first location;
person, or of a particular person in a given mental or providing at least one sensor on the first human being;
physical state, may be monitored and the brain activity detecting brain activity of the first human being using the
stored and analyzed in the computer 21 memory. This stored al least one sensor wherein the brain activity is indica-
brain activily may then be caused by remotely causing the live of words to be communicated by the first human
fining devices to cause particular brain node(s) to be fired al 65 being, and [forwarding the detected brain activity
given times or intervals in a predetermined manner or indicative of words to be communicated to the сош-
sequence, The computer may be programmed to instruct the puter at the second location;
151 / 340
163 / 570
164 / 569
6,011,991
11
comparing the received brain activity of the first human
being indicative of words to be communicated with
normalized or averaged brain activity information
relating 10 Ше first human being from memory; and
determining words being communicated by the first
human being based upon the comparing of the received
brain activity information to the information from
memory.
7. Ге method of claim 6, further including asking the first
human Беше a plurality of questions and recording brain
activity of the first human being responsive to the plurality
tA
10
12
of questions in a process of developing the normalized or
averaged brain activity information relating to the first
human being.
8. The method of claim 6, further comprising the step of
the computer outputting words determined in said determin-
ing Мер lo a second human being so that words thought ог
stated by Ше first human being are communicated by the first
human being to the second human being via the computer.
152 / 340
164 / 570
PDF SECTION:
UNITED STATES PATENTS.
E
Patent Number: 4,877,027
Date of Patent: | Oct. 31, 1989.
FM
CAPABLE MICROWAVE
PULSE GENERATOR
GENERATOR |
VOLTAGE
STANDARD
.httpsilrestricteddocuments.com 101 / 340
Тһе transmission of intelligible speech by audio mod-
ulated Microwave is described in the book Microwave
Auditory Effects and Applications by James C. Lin
1978 publisher Charles C. Thomas.
BRIEF SUMMARY OF THE INVENTION
I have discovered that a pulsed signal on a radio
frequency carrier of about 1,000 megahertz (1000 MHz)
is effective in creating intelligible signals inside the head
of a person if this electromagnetic (EM) energy is pro-
jected through the air to the head of the person. Intelli-
gible signals are applied to the carrier by microphone or
other audio source and I cause the bursts to be fre-
quency modulated. The bursts are composed of a group
of pulses. The pulses are carefully selected for peak
strength and pulse width. Various objects, advantages
and features of the invention will be apparent in the
specification and claims.
114 / 570
United States Patent па
Brunkan
0] Patent Number:
[45] Date of Patent:
4,877,027
Oct. 31, 1989
[54] HEARING SYSTEM
[76] Inventor: Wayne B. Brunkan, Р.О. Box 2411,
Goleta, Calif. 93118
[21] Appi No.: 202,679
dun, 6, 1988
[22] Filed:
[51] caca AGIN 5/00
1521 U.S. CL онен 128/420.5
[58] Field of Search ............... 128/420.5, 804, 419 R,
128/421, 422, 746; 381/68
[56] | References Cited
U.S. PATENT DOCUMENTS
3,629,521 12/1971 Pubarich et al. ................. 128/402.5
3,766,331 10/1973 Zink ................................ 128/420.5
OTHER PUBLICATIONS
Cain et al, "Mammalian Auditory Responses . . . ",
IEEE Trans Biomed Eng, pp. 288-293, 1978.
Frey et al, “Human Perception . .. Energy" Science,
181,356-358, 1973.
Jaski, “Кайо Waves & Life", Radio-Electronics, pp.
45-45, Sep. 1960.
Microwave Auditory Effects and Applications, Lin, 1978,
pp. 176-177.
Primary Examiner—Lee S. Cohen
Attorney, Agent, or Етт--Наггу W. Brelsford
[57] ABSTRACT
Sound is induced in the head of a person by radiating
the head with microwaves in the range of 100 mega-
hertz to 10,000 megahertz that are modulated with a
particular waveform. The waveform consists of fre-
quency modulated bursts. Each burst is made up of ten
to twenty uniformly spaced pulses grouped tightly to-
gether. The burst width is between 500 nanoseconds
and 100 microseconds. The pulse width is in the range
of 10 nanoseconds to 1 microsecond. The bursts are
frequency modulated by the audio input to create the
sensation of hearing in the person whose head is irradi-
ated.
8 Claims, 1 Drawing Sheet
VOLTAGE
STANDARD
FM
CAPABLE MICROWAVE 21
PULSE GENERATOR
GENERATOR |
154 / 340
166 / 570
US. Patent Oct. 31, 1989 4877 027
ЕМ |
CAPABLE MICROWAVE
PULSE
| GENERATOR |
GENERATOR
}
10
шы ke RANGE PULSE =) «— 10 NANO SEC
500 NANO SEC. |
TO 100 MICRO SEC. TO 1 MICRO SEC.
167 / 569 155/ 340 167 / 570
168 / 569
4,877,027
1
HEARING SYSTEM .
This invention relates to a hearing system for human
beings in which high frequency electromagnetic energy
is projected through the air to the head of а human
being and the electromagnetic energy is modulated to
create signals that can be discerned by the human being
regardless of the hearing ability of the person.
THE PRIOR ART
Various types of apparatus and modes of application
have been proposed and tried to inject intelligible
- sounds into the heads of human beings. Some of these
have been devised to simulate speech and other sounds
in deaf persons and other systems have been used to
inject intelligible signals in persons of good hearing, but
bypassing the normal human hearing organs.
U.S. Pat. No. 3,629,521 issued Dec. 21, 1971 describes
the use of a pair of electrodes applied to a person's head
to inject speech into the head of a deaf person. An oscil-
lator creates a carrier in the range of 18 to 36 KHz that
is amplitude modulated by a microphone.
Science magazine volume 181, page 356 describes a
hearing system utilizing a radio frequency carrier of
1.245 GHz delivered through the air by means of a
waveguide and horn antenna. The carrier was pulsed at
the rate of 50 pulses per second. The human test subject
reported a buzzing sound and the intensity varied with
the peak power.
Similar methods of creating “clicks” inside the
human head are reported in LE.E.E. Transactions of
Biomedical Engineering, volume BME 25, No. 3, May
1978.
The transmission of intelligible speech by audio mod-
ulated Microwave is described in the book Microwave
Auditory Effects and Applications by James C. Lin
1978 publisher Charles C. Thomas.
BRIEF SUMMARY OF THE INVENTION
I have discovered that a pulsed signal on a radio
frequency carrier of about 1,000 megahertz (1000 MHz)
is effective in creating intelligible signals inside the head
of a person if this electromagnetic (ЕМ) energy is pro-
jected through the air to the head of the person. Intelli-
gible signals are applied to the carrier by microphone or
other audio source and I cause the bursts to be fre-
quency modulated. The bursts are composed of a group
of pulses. The pulses are carefully selected for peak
strength and pulse width. Various objects, advantages
and features of the invention will be apparent in the
specification and claims.
BRIEF DESCRIPTION OF THE DRAWINGS
In the drawings forming an integral part of this speci-
fication:
FIG. 1is a block diagram of the system of the inven-
tion.
FIG. 2 is a diagram of an audio wave which is the
input to be perceived by the recipient.
FIG. 3 is a diagram on the same time coordinate as
FIG. 2 showing bursts that are frequency modulated by
the wave form of FIG. 2.
FIG. 4 shows, on ап enlarged time coordinate, that
each vertical line depicted in FIG. 3 is a burst of puises.
(А. burst is a group of pulses).
10
25
30
35
55
65
2
FIG. 5 shows, on a further enlarged time coordinate,
a single continues pulse, Depicted as'a vertical line in
FIG. 4.
DETAILED DESCRIPTION OF THE
INVENTION
Inasmuch as microwaves can damage human tissue,
any projected energy must be carefully regulated to
stay within safe limits. The guideline for 1,000 MHz, set
by the American Standards Institute, is 3.3 mw/cm2
(3.3 milliwatts per square centimeter). The apparatus
described herein must be regulated to stay within this
upper limit.
Referring to FIG. 1 a microphone 10 or other genera-
tor of audio frequencies, delivers its output by wire 11
to an FM capable pulse generator 12 and by branch
wire 13 to 2 comparator 14. The comparator 14 also
receives a signal from a voltage standard 16. When the
peak voltage of the audio generator 10 falls below the
standard 16 the comparator delivers a signal by wire 17
to the FM capable pulse generator 12 to shut down the
pulse generator 12. This avoids spurious signals being
generated. The output of the FM pulse generator 12 is
delivered by wire 18 to a microwave generator 19
which delivers its output to the head of a human being
23. In this fashion the person 23 is radiated with micro-
waves that are in short bursts.
The microwave generator 19 operates at a steady
frequency presently preferred at 1,000 megahertz (1,000
million). I presently prefer to pulse the microwave en-
ergy at pulse widths of 10 nanoseconds to 1 microsec-
ond. For any one setting of the FM capable generator
12, this width is fixed. The pulses are arranged in bursts.
The timing between bursts is controlled by the height of
the audio envelope above the voltage standard line. In
addition the bursts are spaced from one another at a
non-uniform rate of i to 100 KHz. This non-uniform
spacing of bursts is created in the FM capable generator
12.
Referring to FIG. 2 there is illustrated an audio wave
27 generated by the audio input 10 wherein the horizon-
tal axis is time and the vertical axis is voltage. For illus-
trative purposes the wave 27 is shown as having a volt-
age peak 28 on the left part of FIG. 2 and a voltage peak
29 of the right side of FIG. 2. The voltage standard 16
of FIG. 1 generates a dc voltage designated at 31 in
FIG. 2. This standard voltage is preferabiy at about
50% of the peak voltage 28. The comparator 14 of FIG.
1 actuates the FM capable generator 12 only when Ше
positive envelope of the audio wave 27 exceeds the
voltage standard. The negative portions of the audio
wave are not utilized.
Referring now to FIG. 3 there is illustrated two
groups of bursis of microwave energy that are delivered
by the antenna 22 of FIG. 1 to the head of the person 23.
FIG. 3 has a horizontal time axis identicai to the time
axis of FIG. 2 and has a vertical axis that in this case
represents the power of the microwaves from generator
19. At the left part of FIG. 3 are a plurality of micro-
wave bursts 32 that occur on the time axis from the
point of intersection of the standard voltage 31 with the
positive part of the audio wave 27, designated as the
time point 33 to time point 34 on FIG. 2. It will be noted
in FIG. 3 that the bursts 32 are non-uniform in spacing
and that they are closer together at the time of maxi-
mum audio voltage 28 and are more spread out toward
the time points 33 and 34. This is the frequency modula-
tion effected by the FM pulse generator 12.
156 / 340
168 / 570
169 / 569
4,877,027
3
Referring to the right part of FIG. 3 there are a plu-
rality of microwave bursts 36 that are fewer in number
and over a shorter time period than the pulses 32. These
extend on the time axis of FIG. 2 from point 37 to point
38. These bursts 36 are also frequency modulated with
the closest groupings appearing opposite peak 29 of
FIG. 2 and greater spacing near time points 37 and 38.
Referring now to FIG. 4 there is illustrated the fact
that a single burst shown as straight lines 32 or 36 on
FIG. 3 are made up of ten to twenty separate micro-
wave pulses. The duration of the burst is between 500
nanoseconds and 100 microseconds, with an optimum
of 2 microseconds. The duration of each pulse within
the burst is 10 nanoseconds to 1 microsecond and a time
duration of 100 nanoseconds is preferred. The bursts 32
of FIG. 3 are spaced non-uniformly from each other
caused by the frequency modulation of 12. FIG. 4 de-
picts a burst. Each vertical line 40 in FIG. 4 represents
a single pulse. Each pulse is represented by the envelope
41 of FIG. 5. The pulses within a burst are spaced uni-
formly from eachother. The spacing between pulses
may vary from 5 nanoseconds to 10 microseconds.
Referring now to FIG. 3, the concentration of bursts
32 opposite the peak 28 of FIG. 2 сап be expressed as а
frequency of repetition. I presently prefer to adjust the
FM capable generator 12 to have a maximum frequency
of repetition in the range of 25 Khz to 100 Khz. 1 delib-
erately keep this range low to reduce the amount of
heating caused by the microwaves. The wider spacing
of the pulses 32 opposite the cutoff points 33 and 34 of
FIG. 2 can also be expressed as a frequency of reptition
and I presently prefer a minimum repetition rate of 1
KHz. I find that this low repetition rate, altnough in the
audio range, does not disrupt the transmission of auoio
5
30
4 |
егей by coaxial cable 21 to the parabolic antenna 22 to
project microwaves onto the head of a person 23. These
microwaves penetrate the brain enough so that the
electrical activity inside of the brain produces the sensa-
tion of sound. When the parameters are adjusted for the
particular individual, he perceives intelligible audio,
entirely independently of his external hearlng organs.
PRESENTLY PREFERRED QUANTITIES
As mentioned previously, I prefer rhat the standard
voltage 31 of FIG. 2 be about 50% of peak audio volt-
age. This not only helps to reduce heating in the person
2 but also reduces spurious audio. This 50% is not vitai
and the useful range is 25% to 85% of peak audio.
The minimum burst repetition frequency (for exam-
ple at time points 33 and 34) is preferably 1 KHz and the
maximum repetition frequency is in the range of 25 KHz
to 100 KHz, with the lower frequencies resuiting in less
heating. |
Тһе time duration of each individual pulse of micro-
wave radiation is in the range of 10 nanoseconds to 1
microsecond as indicated in FIG. 5, with the shorter
time periods resulting in less heating.
CONTROL OF POWER OUTPUT
As stated above, I maintain the power output of the
parabolic antenna 22 within the present safe standard of
3.3 mw/cm2 (3.3 milliwatts per square centimeter). I
control the power output by controlling the strengtn of
the audio modulation. This results in a duty cycle of
0.005, the decimal measure of the time in any second
that the transmitter is on full power. The peak power
level can be between 500 mw and 5 w and at 0.005 duty
cycle these peaks wiil result in an average power of 2.5
intelligence to the person 23. The aim, again, is to re- 35 mw and 25 mw respectively. However, these values are
duce the amount of heat transmitted to the subject 23. further reduced by adjusting the audio modulation so
that zero input produces a zero output. Since a voice
OPERATION signal, for exampie, is at maximum amplitude only a
Referring to FIG. 1, the intelligence to be perceived small fraction of the rime, the average power will be
by the person 23 is introduced at the audio source 10 40 below the 3.3 mw/cm2 standard, even with 5 watts
which may be a microphone for voice, or a tape player peak power.
for music, instruction, etc. This audio signal is transmit-
ted to the FM capable generator 12 and to the compara- THEORY OF OPERATION
tor 14. The comparator 14 compares the positive por- I have not been able to experiment to determine how
tions of the audio wave with voltage from the voltage 45 my microwave system works, but from my interpreta-
standard 16 and when the audio wave instantaneously tion of prior work done in this field I believe that the
exceeds the standard voltage, the FM generator is actu- process is as follows. Any group of bursts related to the
ated by the wire 17 connecting the comparator 14 and audio ek 28 of FIG. 2 causes an increasing ultrasonic
the FM generator 12. The FM generator 12 then sends build up within the head of a human being starting with
a plurality of signals to the microwave generator 19 at 50 a low level for the first bursts pulses and building up to
each peak of the audio wave above the voltage stan- а high level with the last bursts pulses of a group. This
dard. buildup, I believe, causes the direct discharge of ran-
This is shown graphically in FIGS. 2-5. The audio | dom brain neurons. These discharges at audio fre-
signal 27 of FIG. 2 exceeds the standard voltage 31 at quency create a perception of sound. This process, I
point 33 whereupon the FM generator 12 starts emitting 55 believe, bypasses the normal hearing organs and can
burst signals 32 at its lowest frequency of about 1 Khz. create sound in a person who is nerve-dead deaf. How-
As time progresses past point 33 the voltage above the ever, this theory of operation is only my guess and may
standard кани and the FM generator 12 responds prove to be in error in the future.
by making the burst signals closer together until at
28 the maximum density of burst signals 32 is а 60 APPARATUS
for example at a frequency of 50 Khz. The time duration The apparatus of FIG. 1 for carrying out my inven-
of each pulse 40 (FIG. 4) is also controlled by a fixed tion may include as a microwave generator Model
adjustment of the FM generator 12 and for example the РНАОК of Applied Microwave Laboratories and de-
duration may be 100 nanoseconds. scribed as Signal Source. The cable 21 connecting the
The frequency modulated burst signals are delivered 65 microwave generator 19 and the antenna is RG8 coaxial
by FM generator 12 to the microwave generator as cable by Belden Industries. The antenna 22 may be a
interrupted dc and the microwave generator is turned | standard parabolic antenna. The FM generator 12 has to
оп in response to each pulse 40 and its output is deliv- бе specially built to include the spacing runction which
157 / 340
169 / 570
170 / 569
4,877,027
5
is obtained by a frequency generator built into a srand-
ard FM generator.
I have described my invention witn respect to а pres-
ently preferred embodiment as required by the patent
statutes. It will be apparent to those skilled in the tech-
nology that many variations, modification and additions
can be made. All such variations, modifications and
additions that come within the true spirit and scope of
the invention are included in the claims.
I сізіш:
1. Apparatus for creating human hearing comprising:
(a) an audio source for creating electrical audio
waves having positive peaks;
(b) a frequency modulator generator connected to the
audio source to create frequency modulated bursts;
(c) a source of constant voltage to create a voltage
standard that is in the range of 25% to 85% of the
peak voltage of the audio waves;
(d) a comparator connected to the voltage source and
the audio source to compare the instantaneous
voltage of the waves from the audio source with
the voltage standard;
(e) a connection of the comparator to the frequency
modulator generator to activate the frequency
modulator generator when the instantaneous volt-
age of the audio wave exceeds the standard volt-
age;
(f) a microwave generator creating microwaves in
the range of 100 тераһегіг to 10,000 megahertz
and connected to the frequency modulator genera-
tor, generating microwaves only when pulsed by
the frequency modulator generator; and
(в) ап antenna connected to the microwave generator
to radiate the head of a human being to producethe
sounds of the audio source.
2. Apparatus as set forth in claim 1 wherein the fre-
quency generating range of the frequency modulator
generator is 1 Khz to 100 KHz for bursts and 100 KHz
to 20 MHZ for pulses within a burst.
3. Apparatus as set forth in claim 1 wherein the fre-
quency generating range of the frequency modulator
generator is one Khz to 100 KHz for bursts and 100
158 / 340
10
20
25
30
35
40
45
50
55
65
6
KHz to 20 MHZ for pulses within a burst and the dura-
tion of each pulse of the frequency modulator generator
is in the range of 10 nanoseconds to 1 microsecond.
4. Apparatus as set forth in claim 1 wherein the volt-
age standard is approximately 5096 of the peak of the
audio waves.
8. Apparatus as set forth in claim 1 wherein the an-
tenna is of the type that projects the microwaves in
space to the head of a person.
6. Apparatus for creating human hearing comprising:
(a) an oscillator creating an electromagnetic carrier
wave at a selected frequency in the range of 100
Mhz to 10,000 Mhz;
(b) a pulse generator connected to said oscillator to
pulse the carrier with pulses having a width in the
range of 10 nanoseconds to | microsecond with а,
minimum spacing between pulses of about 25 nano-
seconds;
(c) а frequency modulator connected to the pulse
generator;
(d) an audio signal generator connected to the modu-
latior which modulates the pulses in accordance
with the audio signal; and
(е) a transmitting antenna connected to the oscillator
to transmit the carrier wave as thus modified to
project the electromagnetic energy through space
to the head of a person.
7. Apparatus as set forth in claim 6 wherein the mod-
ulator is a frequency modulator to vary the density of
bursts within an audio. envelope as a function of the
audio amplitude.
8. The method of irradiating a person's head to pro-
duce sound in the head of the person comprising
(a) irridiating the head of a person with microwaves
in the range of 100 Mhz to 10,000 Mhz;
(b) pulsing said microwaves with pulses in the range
of 10 nanoseconds to 1 microsecond; and
(c) frequency modulating groups of puises cailed
bursts by audio waves wherein the modulation
extends from 1 Khz to 100 Khz.
а х ж ж ж
170 / 570
PDF SECTION:
UNITED STATES PATENTS.
E
172 / 569
United States Patent 9
Yanagidaira et al.
[54] BRAIN WAVE INDUCING SYSTEM
[75] Inventors: Masatoshi Yanagidaira; Yuichi
Kimikawa; Takeshi Fukami; Mitsuo
Yasushi, all of Saitama-ken, Japan
[73] Assignee: Pioneer Electronic Corporation,
Tokyo, Japan
[*] Notice: This patent issued on a continued pros-
eculiou application filed under 37 CUR
1.53(d), and is subject to the twenty year
patent term provisions of 35 U.S.C.
15Жа)(2).
[21] Appl. No.: 08/797,655
[22| Filed: Jan. 31, 1997
[30] Forcign Application Priority Data
Feb. 21, 1996 — |IP| Japan Les 8-033848
[51] Tnt: E uus A61M 21/00
[52] US; CL aen 600/27; 600/26; 600/28
[58] Field of Search 000:20-28, 544,
600/545, 558; 1287731, 732, 745
US005954629A
500595462
5,954,629
111] Patent Number:
[4] Date of Patent: *Sep. 21, 1999
[56] References Cited
U.S, PATENT DOCUMENTS
5,241,967 9/1993 Yasushi et al. sss 600727
5.495.853 3/1996 Yasushi es 600/27
5,013,498 — 3/1997 Yasushi ctal. sss 600:27
Primary Examiner—linda C. M. Dvorak
Assistant kxaminer—Rosiland Kearney
Attorney, Agent, or Firm—Nikaido, Marmelstein, Murray &
Oram LLP
[57] ABSTRACT
Sensors are provided for detecting brain waves of a user, and
a band-pass filter is provided lor extracting a particular brain
waves including ап а wave included in a detected brain
wave. The band-pass filter comprises a first band-pass filter
having a narrow pass band, and a second band-pass filter
having a wide pass band. One of the first and second
band-pass filiers is selected, and a stimulation signal is
produced in dependency on an & wave extracted by a
selected band-pass filter. In accordance with the stimulation
signal, a stimulation light is emitted to the user in order 10
induce the user to relax or sleeping stale.
6 Claims, 12 Drawing Sheets
REMOTE
CONTROLLER
160 / 340
172 /570
5,954,629
Sheet 1 of 12
Sep. 21, 1999
U.S. Patent
002
SETIORLNOO
ALONE
173 / 570
161 / 340
173 / 569
с
FIG.2 °“
=
Q
мо
2E
А m
р,
s Sg
mmn | EB
ОШ | |
|| | {т | il 71 |
| їн | x ШІ | | |
Ш |
5,954,629
Sheet 3 of 12
Sep. 21, 1999
U.S. Patent
182
ы“------------------------%----4--
55--3
Pigs
|
|
|
e SNLLOOW NOLLOZTAS
омпопаобнани //октаяоояя| 1709100
175 /570
163 / 340
175 / 569
U.S. Patent Sep. 21, 1999 Sheet 4 of 12 5,954,629
FIG.4 a
(C) FREQUENT pod
Ei ODE REGION - REGION "i
a WAVE : i
PRODUCING
PATTERN
UN
RECORED
Е UPPER
BRAIN WAVE THRESHOLD
[8—-13Hz] | j : 13Hz
(B) Е eec سل
FREQUENCY | | LOWER
CHANGE THRESHOLD
| | 8Hz
PHASE JUMPING о
POINT TIME [1sec/ div]
E2
El
APPEARANCE
RATE (96) ES
1 El+E2+E3
<--- س ——
РА айс 3
176 / 569
TIME (MINUTE)
SLEEP FALLING POINT
164 / 340 176 / 570
5,954,629
Sheet 5 of 12
Sep. 21, 1999
U.S. Patent
ES
| Гамора]:
oz LAO]
5--------................
den ANLLNOY NOLLOWTISS
ا омпопаохани /5NIdWOOsN| YE TIOHLNOD
Я V| TEZ 92
E rum
SNILNOY
NOLLOXTHS UNV
О— дд...
VOOZ
JA TIOS.LNOO
SALON
177 / 570
165 / 340
177 / 569
U.S. Patent Sep. 21, 1999 Sheet 6 of 12 5,954,629
FIG.6 a
100
102 102
101
FIG.6 b
178 / 569 166 / 340 178 / 570
U.S. Patent Sep. 21, 1999 Sheet 7 of 12 5,954,629
FIG.7 a
100
120 (GND) 103 130 (—)
140 (+) 140 (4-)
FIG.7 b
323 101
321 322
179 / 569 167 / 340 179 / 570
U.S. Patent Sep. 21, 1999 Sheet 8 of 12 5,954,629
FIG.8
100A
120 (GND) 130 (—)
103
102 102
101
140 (+) 140 (4-)
1008
“ 103 130(-)
102 102
101
140 (GND) 140 (+)
180 / 569 168 / 340 180 / 570
5,954,629
Sheet 9 of 12
Sep. 21, 1999
U.S. Patent
E NETIOXLNOO
a NOLLOWINS акуя
E
002
2М010880)
ALONAY
181 / 570
169 / 340
181 / 569
5,954,629
Sheet 10 of 12
Sep. 21, 1999
U.S. Patent
LL Ola
ТОМЫ
Те
182 / 570
170 / 340
182 / 569
U.S. Patent Sep. 21, 1999 Sheet 11 of 12 5,954,629
FIG.12
183 / 569 171 / 340 183 / 570
5,954,629
Sheet 12 of 12
Sep. 21, 1999
U.S. Patent
Lav YONG
СГУ
184 / 570
172 / 340
184 / 569
185 / 569
5,954,629
1
BRAIN WAVE INDUCING SYSTEM
BACKGROUND OF THLE INVENTION
1те present invention relates to a system for inducing a
brain wave ol the person, and more particularly 10 a system
for providing a relaxation effect and an activation elect in
а state of mind of the person.
In the system, the brain wave of the person is induced by
tA
2
analog signal. The amplifier 30 amplifies the analog signal
so as to control the light emitted Пот the light emitting
member 32 of the aciuating шті 30.
The light signal producing system 20 further comprises a
microprocessor unit (MPU) 22 having a controller 23. The
AGC 26 and BPF 27 arc operated by programs of the MPU
22. А remote controller 21 is provided for applying external
operating commands to the controller 23. l'he controller 23
controls tasks and other circuits in the system in accordance
a feedback control including a brain of the person. Namely, 10 with the operations of the remote controller 21. For example,
the brain wave ol the person is detected, and a specific the controller 23 produces a message A to initialize the BPF
element of the brain wave, such as ап с wave is extracted. 27, and controls the amplifier 29 of gain variable Гог
By using Ше extracted brain wave, 8 signal for controlling adjusting the amount of the stimulation light in accordance
stimulation by light is produced for inducing a desired brain wih a-choice of ihe ser
Wave. The stimulating light is applied to the person for 15 In the BPF 27, since the а wave of the brain wave is
stimulating the brain, thereby inducing Ше desired brain ЗЕН F: N А S I mE
wave. Uhus, the desired brain wave can Пе powerlully and Hagen to ios p en 5. а пощи band
quickly induced by an induction effect of the feedback 8 in ove in me b rii € Ж hé ie ame adi
donus appeared in large amoun is when an aw akening normal à ult
. . resis, and has а leature thal the dispersion thereof is small
Such a system is used for as а sole system, ог aS а 20 when the person is relaxed in a clearer awakening state.
combination system with au audio healing system or a Thus, the BPF 27 has a frequency characteristic of О-10
massage device. (О=(сепіег frequency Г); (Бапа width Ше gain of which
НО. 13 shows a conventional brain wave inducing sys- becomes lower than the gain of the center frequency ГБу 3
tem employed with a feedback loop structure including a di3)). The a wave has a waveform having an amplitude
brain of a user. The system comprises a sensor unit 10 for 25 between 10 to 100 НУ and frequency between 8 to 14 Hz.
detecting a brain wave of the user, a light signal producing However, there is an individual difference in о. wave char-
system 20 for extracting a specific element of the brain wave acteristics. ‘Thus, the center Гтециепсу of the ІРІ: 27 is set
and producing a light stimulation signal, and an actuating to be varied for covering the range of the [requency.
unit 30 for applying the stimulating light based on the light — l'urthermore, in the BPI 27, since a proper o wave is
stimulation signal to the user. 20 determined іп dependeney on the person, influence caused
The sensor unit 10 comprises a headband 11 to be casily by the individual difference is controlled to be absorbed. If
put on or removed from a head of the user, and an ear clip a person having a high frequency of à wave is induced to a
14a detachably clipped оп an ear of the user. A pair of range of a low Ітедиепсу of о. wave, the person may [ее] bad
electrodes 12 and 13 as brain wave sensors arc provided on _ because of a large difference between the frequencies. In
an inner portion of the headband 11 so that the electrodes are 35 order to solve the problem, at initialization, the BPF 27
touched on a forchead of the user when the headband П is operates to change the center frequency step by step to
put on the head. The ear chp 144 has an electrode 14 as а sweep the band of the a wave. Then, ап average lrequency
brain wave sensor to be touched on the ear. of the bram wave signal is calculated to set the center
‘The actuating unit 30 comprises a capsule or cover 31 lo б frequ сосу to a value lower than the average valuc by 0.5 Hz.
cover the head and face of the user, and a light emitting Thereafter, the center frequeney is fixed to the өсі value
member 32 provided on an inner portion of the the cover 31 during the procedure. Thus, an inconvenience such as a bad
al a position such that the stimulation light is applied to eves feeling is avoided.
of the user. Describing the operation of the system, the brain wave of
‘The light signal producing system 20 is provided [or ¿s the user is detected by the sensor unit 10. The detected brain
extracting the specific clement of the brain wave and pro- wave is amplified by the amplifier 24. The amplificd brain
ducing a light stimulation signal for controlling stimulation wave is applied through the A/D converter 25 and the AGC
by light based on the extracted brain wave, thereby inducing 26 to the BPI 27 where a proper a wave is extracted. "The
the desired brain wave. The system comprises a biological extracted brain wave is applied to the amplifier 29 through
amplifier 24 to which outputs of the electrodes 12, 13 and 14 « the DA converter 28. The amplifier 29 produces an electric
of the sensor unit 10 arc connected, ап АЛ) converter 25, an signal for light stimulation based on Ше extracted brain
automatic ваш control circuit (AGC) 26, a band-pass filter wave. The light stimulating signal is applied to the actuating
(18017) 27, a DA converter 28, and ап amplifier 29 connected unit 30. lhe light emitting member 32 emils the light for
to the light emitting member 32 of the actuating unit 30. stimulation which is applied lo the closed eyes of the user,
The electrodes 12 of the sensor unit 10 is connected to a 55 thereby stimulating the brain. : | N
GND input of the amplifier 24, the electrode 13 is connected Thus, the user is sufficiently applicd with a proper light
to a minus input, and the electrode 14 is connected to a plus stimulation produ ced bascd on own c wave to be induced to
input, respectively. The amplifier 24 amplifies a very weak a relaxed state in a short time.
brain wave signal detected by the sensor unit 10 10 a As hereinbefore described, a main purpose of the con-
predetermined value. ‘The amplified brain wave signal is 60 ventional brain wave inducing system is to Induce the person
applied to the A/D converter 25 for converting the signal шо to а relaxed condition.
а digital signal of 8 bits, for example. The digital brain wave However, if the system is provided with not only the
signal is applied to the AGC 26 in which the gain of the relaxation effect but also a sleep inducing elTect Гог posi-
signal is adjusted l'or a following stage. The BPI 27 operates tively inducing the person to sleep, the product worth of the
lo extract a predetermined element of the band of the brain 65 system may be increased. In Ше improvement,
wave signal. The D/A converter 28 converts the extracted economically, it is necessary to lower developing and manu-
band clement of the brain wave of the digital signal into an facturing costs as less as possible.
173 / 340
185 / 570
186 / 569
5,954,629
3
In order to realize the brain wave inducing system pro-
vided with Ше sleep inducing electi in addition іс Ше
relaxation elect by using the basic composition of the
conventional system with small change, technical means
must be designed for the system.
l'urtbermore, in the conventional system, one of the brain
wave sensors is mounted ou the bead of the user lor
detecting the brain wave. However, the condition that the
sensor is directly mounted on a part of the body may cause
the user to be nervous. In such a case, a sufficient sleep
FIG. 2 is a diagram showing a frequency characteristic of
the brain wave when a person drops olT to sleep;
116. 3 is a diagram showing a second embodiment of the
brain wave inducing system of the present invention;
110$. 4а and 45 are diagrams showing characteristics of
the brain wave when the person sleeps;
FIG. 5 is a diagram showing a third embodiment of the
present invention;
FIGS. ба to бс arc schematic diagrams showing ап сус
inducing effect сап not be obtained. П the system is used ші mask;
during sleepi пе, the system may interfere natural moving 110$. Та and 75 are schematic diagrams showing the eve
such as turning in sleep. p е
при D 5 mask;
Therefore, it is preferable that the system can be used кер 2 Е 28522 "
without mounting sensors on the body. | ПО. 8 is a plan view showing a modification of Ше eye
| dw | : 15 mask;
l'urthermore, the ear clip is used as the other brain sensor . . . _ , |
because the ear is near ihe brain, and has no muscles. FIG. 9 is a plan view showing another modification of the
Consequently, noises to be caused by action of the muscle do | СУС Mask;
not producc. In addition, the electrode can bc casily attached FIG. 10 is a diagram showing a fourth embodiment of the
10 Ше ear by the ear clip. jy Present invention;
However, the ear clip stimulates the ear compared with L1G. 11 is a diagram showing а filth embodiment of the
the headband, and may hurt the ear if it is used for а long present invention;
timc. FIG. 12 is a schematic diagram partly showing a modi-
Therefore, it is desirable that even if the user must mount fication of the first embodiment; and
Ше seusor оп Ше body, Ше relaxation and sleep iuducing 25 BIG. 13 is a diagram showing a conventional brain wave
elects, or al least Ше relaxation ellect can be easily inducing system.
obtained.
SUMMARY Ol: THE INVENTION DETAILED DESCRIFTION OF THE
: А P я : PREFERRED EMBODIMENTS
^n object of the present invention 15 lo provide a brain 30 (l'irst embodiment)
wave induciug system which may have relaxation inducing L1G. 1 shows a brain wave inducing system of the present
effect and sleep inducing effect. invention applied to a mind refresh system.
Another object of the present invention is to provide a It is known that when the person closes the eyes, the brain
system with which relaxation ellect and sleep inducing wave produces the e wave, and when the person drops off
ellect are easily obtained. 35 lo sleep, Ше « wave changes 10 a 73 wave а Педиепсу of
According to the present invention, there is provided а which is lower than Ше с. wave. FIG. 2 shows frequency
brain wave inducing system comprising sensors for detect- characteristics of the brain wave until the person falls into
ing brain waves of a uscr, a band-pass filter for extracting a sleep. It will be scen that there are states where the person
particular brain waves including an « wave included in a closes сусѕ and rests for З minutes, and falls into slecp
detected brain wave, the band-pass filter comprising a first 40 through а sleep transient period Гог 7 minutes. The stale of
band-pass filter having a narrow pass band, and a second mind of the person changes from a relaxation stale in the
band-pass filter having a wide pass band, first sclecting closed-cyes rest period, а special doze state where a flash of
means for selecting one of the first and second band-pass an idea or an imape may be casily produced, and to a sleep
fillers, output means lor producing a stimulation signal state. The с wave has a small dispersion in the closed-cye
dependent on ап a wave extracted by a selected band-pass 45 rest period, and is repealedly disappeared and reappeared
filter, and light emitting means responsive to the stimulation with Ductuation in the sleep transient period, and changes to
signal for emitting a stimulation light to the user. the ¢ wave in the slecp period. The attention of the person
А memory is provided for recording the extracted brain is gradually reduced to reduce the awakening level.
waves and lor reproducing the recorded brain waves, and Referring back to 116. 1, in the brain wave inducing
second selecting means for selecting either of the recording 50 system, structures which are the same as those of Ше
or reproducing of the brain waves. conventional system of LIG. 13 are identified with the same
The sensors arc mounted on an сус mask to be attached reference numerals as FIG. 13, and descriptions thereof are
тоа forchcad of the user. omitted.
The detecting means is provided for detecting a sleep A lighi signal producing syslem 200 has a BPL unit 270
falling point when the user Talls into sleep. The detecting 55 comprising a first РІ: 2704 апа a second BPI’ 2705, and
means detecis the sleep falling point by detecting a time switches 51 and S2 for selectively connecting the first BPF
when а wave appearance rate reduces 50% from a reference 270a and the second BPF 270b to the AGC 26 and the D/A
value. converter 28. The first BPF 270а has (О-10 with a narrow
These and other objects and features of the present pass band corresponding lo the a wave in the eye-closed тезі
invention will become more apparent from the following 50 state. The second ІРІ: 270 has Q=5 with a wide pass band
detailed description with reference to the accompanying | Corresponding to support frequency ranges of fluctuation of
drawings. the а wave in the ісер transient state. The center frequency
рада | На and the Q of each of the first and second BPI’s are provided
BRILE DESCRIPTION Ol DRAWINGS to be changeable.
МО. Í is а diagram showing a mind-refresh system io 65 A controller 230 of the MPU 22 has a band selection
which a brain wave inducing system according to the present routinc 231 having a normal mode and a sleep induction
invention is applied; mode. One of the modes is selected by operating a remote
174 / 340
186 / 570
187 / 569
5,954,629
5
controller 121, and the band selection routine 231 produces
a flag B which is applied to the BPI" unit 270 Гог selectively
operating the switches S1 and 52 to close contacts for the
first BPF 270a or the second BPF 2705. Thus, the с wave
is extracted. from a proper BPF in accordance with the
selected mode.
In operation, the brain wave of Ше user is detected by the
sensor unit 10. The detected brain wave is amplified by the
amplificr 24. The amplified brain wave is applied through
the АЙ? converter 25 and the AGC 26 to Ше BPL 270 where
tA
6
in Ше memory 281, and a reproducing mode for reproducing
the data stored in the memory 281. Lach mode is selected by
operating (he remote coniroller 121, and Ше recording?
reproducing sclection routine 232 produces control signals C
and D which are applied to the switching circuits S3 and S4,
respectively.
When the recording mode is selected, the control signal С
operates the switching circuit S3 to close it. The control
signal D operates the switching circuit S4 to connect Ше
BPF unit 270 to the D/A converter 28. Thus, the extracted
a proper о. wave is extracted. Namely, when the normal 1 brain wave of the BPI unit 270 is applied to the memory 281
mode is selected by the remote controller 121, the flag B of and stored therein, and to the D/A converter 28.
the normal mode is applied to the switches 51 and 52 of the On the other hand, when Ше reproducing mode is
BPU unit 270 which are operated to close the first BPI’ 270a. selected, the control signal С operates the switching circuit
Thus, the output signal of tbe AGC 26 is applied 1o the first S3 lo open il. The control signal D operates the switching
BPF 270a through the switch S1. The first BPF 270a 15 circuit S4 to connect thc memory 281 to Ше D/A converter
extracts Ше œ wave in the cye-closcd rest state which is 28. Thus, the brain wave data stored in the memory 281 is
applied to the DA converter 28 through the switch $2. Thus, reproduced and applied to Ше D/A converter 28.
a slimulation signal having a [Tequency corresponding to the The sleep falling point detecting circuit 250 is provided
extracted & wave is produced. The stimulation signal is for detecting а sleep falling point in accordance with the a
applied to the light emitting member 32 through the ampli- 20 wave. The sleep falling point detecting circuit 250 is applicd
fier 29. The light emitting member 32 llickers al Ше fre- with the brain wave signal from the amplifier 24 and detects
quency of the simulation signal. ‘Thus, the а wave in the that the amount of the c wave included in Ше brain wave
eye-clased rest state is applicd by the feedback control, reduces compared with the amount of the о. wave in the
thereby obtaining the relaxation «Несі, closed-eye rest state. Thus, the slecp falling point іп which
When the sleep induction mode is selected, the Нар B of 25 the person falls into sleep through the sleep trasient period
the sleep induction mode is applied 10 the switches S1 and is detected. lhe detected signal is applied to the controller
$2 which are operated to close the second BPI’ 2705. Thus, 230A of the MPU 22. р . КРЕ .
the output signal of the AGC 26 is applied to the second BPF я The Men. E aron of the жк ae point detect-
270b through thc switch 51. The second BPF 2706 extracts | TE ОТОН т. will pe 2 UE аи, e Я
Ше о. wave in the sleep transient state which is applied to the 5o ance rale ot the PE I RV M "n ешше N D (accumu bn „ште
р s vy d Q. š | of a frequent region of the © wave/l minute)x100%. А
D^ ET Е through ihe уеп 52. Тї», even u шев reference value of the с. wave appearance rate is obtained
Wave 15 fluctuated m the sleep transient stale, approximately based оп an average of Ше a wave appearance rale from a
all of the OWAYE 18 applied by the feedback control, thereby slari point. When the o wave appearance rate is less than
obtaining the slecp inducing effect. р 50% of the reference valuc, it is determined that the point at
l'rom the l'oregoing, Ше leedback control is repeated so 35 that time is the sleep falling point. In an example shown in
that the induction operation of brain wave lor increasing the VIG. 45, when 4 minutes have passed, the sleep falling point
sleep inducing elect is provided in addition 10 the induction is detected. In order to prevent erroneous detection caused
operation for increasing the relaxation effect. A desired by noises made by opening and closing сусѕ, and muscles,
effect can be automatically obtained by selecting a desired the averaging process is used.
mode in dependency on a body condition of the user. 40 [n order to obtain the lrequent region of the o wave, the
(Second embodiment) Irequencv of the detected brain wave is calculated as shown
Referring to FIG. 3 showing а second embodiment of the in FIG. да. When the frequency is deflected from the range
present invention, the system is provided with a recording’ between 8 and 13 Hz, a jumping point of phase is deter-
reproducing function for a proper retracted brain wave when mined, When a period of the phase jumping point execeds 1
the person drops off to sleep. In a light signal producing 45 second, that period is determined as the frequent producing
system 200A, a controller 230A of the MPU 22 further has region of the с. wave. An instantaneous frequency of the
а recording ‘reprocicing selection routine 232. Furthermore, detected brain wave is obtained by а known complexed
a sleep falling point detecting circuit 250 and a recording’ Demodulation (CD) method.
reproducing changeover circuil 280 are provided. As a result of experiments based on a sincipital brain
Other parts are Ше same as those of the first embodiment 50 wave, Ше sleep falling point was detected at high
of LG. 1 and identified with the same reference numerals as probability, more than 80%.
FIG. 1. When the controller 230A of thc MPU 22 is applied with
The recording/reproducing changcover circuit 280 com- the «ісер falling point signal from the «ісер falling point
prises a memory 281 such as a ring buller provided between detecting circuit. 250, Ше recordingireproducing selection
the BPI unit 270 and the DA converter 28 for storing Ше 55 routine 232 operates the control signal C to open Ше
brain wave extracted by the BPF unit 270, and for applying switching circuit S3. Thus, the data recording of the BPF
the stored data of the brain wave to the D/A converter 28. unit 270 in the memory 281 is stopped, and the stored
The memory 281 has a storage capacity for storing data of content is fixed corresponding to the sleep falling point
the extracted brain wave for the BPU unit 270 Гог a few detection.
minules. 60 Describing the operation of the system, when the user
The recording ‘reproducing changeover circuit 280 further selects the recording mode, the brain wave signal of the BPF
has an input switching circuit $3 for connecting the BPF unit unit 270 is applicd to Ше РА converter 28 through the
270 lo the memory 281, and an output switching circuit 54 switching circuit S4. hus, the relaxation еПес and the sleep
for selectively connecting the BPI unit 270 and the memory inducing elleci are selectively obtained.
281 to the DA converter 28. 65 At the same time, the brain wave signal of the BPU unit
The recording ‘reproducing selection routine 232 has a 270 is applicd to the memory 281 through the switching
recording, mode for recording the output of the BPF unit 270 circuit S3 and storcd thercin.
175 / 340
187 / 570
188 / 569
5,954,629
7
When the user falls into ісер, and the sleep falling point
detecting circuit 250 detects Ше sleep falling point, the
switching circuit S3 is operated to be opened. ‘Thus, the
content of the memory 281 is fixed at the time. The brain
wave signal before Ше Ясер falling point is maintained
within an allowable range of the storage capacity of the
memory.
AL the subsequent utilization of the system, if the repro-
ducing, mode is selected by the user, the brain wave data
tA
8
emitting member 320 comprises a base portion 321 and
LEDs 322 adhered lo Ше base portion 321. А piece of
nonwoven fabric 323 is covered оп the base portion 321 as
a cushion member for avoiding a foreign object feeling. The
beams of light emitted from the LEDs 322 of the light
emitting members 320 pass through the nonwoven fabric
pieces 323 so as lo become scattered light and applied to the
corresponding eyes of the user lor visual stimulation.
Thus, the сус mask device 100 integral with the brain
stored in the memory 281 is reproduced and applied to Ше 10 wave sensor and the light emitting clement is formed.
D/A converter 28. In the reproducing, mode, since the light FIG. 8 shows a modification of the сус mask device, In an
signal is produced in accordance with the content of the eye mask device 100A, one end of each ear sirap 102 is
memory, il is not necessary lo use the sensor шті 10. The connected lo a side of the [forehead portion 103. Thus, even
inducing effect is sufficiently obtained without the brain if the rcinforcement member 104 is omitted, the electrodes
wave sensor. 15 120 and 130 can be stably abutted on the forchead by the
In the reproducing mode, the amplification factor is tensile strength of the rubber straps.
gradually reduced to Гаде out the light stimulation because ПО. 9 shows another modification. of the eye mask
the light stimulation. disturbs the sleep of the user. Thus, device. In an eye mask device 10013, the electrode 120 is
luminance is reduced. omitted, and onc of the electrodes 140 is connected to the
It is effective to change luminance in dependency on the 20 GND input of the amplifier 24 in place of the electrode 120.
appearance of the « wave and Ше result of the sleep Гапу By such an arrangement, il is possible to detect the brain
point detection, and to changeover the output of the BPU unit wave.
270. (Other embodiments)
(Third embodiment) FIG. 10 shows a fourth embodiment of the present inven-
Referring to FIG. $ showing a third embodiment of the 25 tion where the сус mask device is employed for the brain
present invention, the system has a face mounted device 100 wave inducing system of the first embodiment.
in ше form of an eye mask in place of the sensor unit and 116. 11 shows a filth embodiment of the present invention
the actuating unit of the previous embodiments, and the light where the сус mask device is employed for the conventional
signal producing system 200A which is the same as the system shown in FIG. 13.
second embodiment of LEG. 3. 30 FIG. 12 shows a modification of the light signal producing
Relernng to VIG. ба, the eye mask device 100 has а system where a BPI unit 270A is provided on a preceding
bandage 101 for shielding the eyes of the user and a pair of stage of the AGC 26 other than the BPI unit 270 as a
car straps 102 made of rubber secured to the both sides of the following stage.
bandage 101. The characteristics of filters of both BPF units are entirely
As shown in ПО. 65, а lug is sewed on an upper portion 35 or approximately the same. Namely, each of the preceding
of the bandage 101 to form а forehead portion 103 which is and following ВРО units 270A and 270 has the first BPU
abutted on a forehead of the user when the eye mask device 2704 having the narrow band and the second BPI’ 2705
100 is put on the face. In the forchead portion 103, а having the wide band. The pass band of the first BPF of the
reinforcement member 104 of a resilient plate is embedded preceding BPF unit is equal to that of the following BPF
so as lo be curved along the forehead. Thus, when the eye 40 unit. Similarly, the pass bands of the second 13015 of the
mask device 100 is pul on the face of the user as shown in preceding and following BPU units are equal to each other.
FIG. 6c, the forehead portion 103 is securely abutted on Ше In operation, the band of the brain wave is limited by the
forchead. preceding BPF unit 270A. The eain of the limited signal is
Referring to FIG. 7a, a pair of electrodes 120 and 130 arc controlled by the AGC 26. The following BPF unit 270
provided on au inner side of the forehead portion 103 in а 45 operates to remove a distortion in the signal caused by the
lateral direction. А pair of electrodes 140 are provided оп gain control.
opposite lower portions of the bandage 101 at positions The structure of thc system is applicable to Ше previous
corresponding to the checks of the facc. embodiments shown in FIGS. 1, 3, 5 and 10.
Lach of these electrodes is lormed by, Гог example a In order to precisely control the AGC 26 and the BPI
copper Toil adhered to the forehead portion 103 and the 50 units 270A and 270 at a high speed, DSP and a circuit are
bandage 101. Г the copper loil directly touches the face, the employed.
user may feel unpleasant. In order to avoid the unpleasant In accordance with the present invention, the band for
fecling, a picce of conductive fiber is adhered on cach extracting the brain wave is sclected by one of the wide and
electrode by a conductive adhesive. As the conductive liber, narrow bands. Consequently, il is effective to obtain the
span polyester fiber with nickel coating is employed. 55 sleep inducing effect in addition to the relaxation effect.
The electrodes 120 is connected to the GND input of the The brain wave is stored in the memory in order to
amplifier 24, namely to the ground through a lead (not reproduce the frequency fluctuation in the sleep transient
shown), the electrode. 130 is connected to the minus input, period. Thus, it is possible to induce the slecp transient state
namely the inverted input thereol, and each of the electrodes by drawing the brain wave without using the brain wave
140 is connected 10 the plus input, namely the non-inveried 60 sensor. Since the troublesome caused by the sensor is
input thereof, respectively. avoided, the relaxation effect and sleep inducing cffcet are
Since the distance between the plus and minus electrodes further improved.
is largely set to increase the difference between the input Since the the brain wave sensor and the light emitting
signals, the S/N ratio is improved. elementis are integrally [formed in the eve mask device
As shown іп FIG. 75, a pair ol light emitting members 320 65 without. the ear clip, Ше relaxation effect can һе easily
are provided on the inner side of the bandage 101 at obtained. Furthermore, the relaxation and sleep inducing
positions corresponding to the eyes of the user. Each light effects arc improved.
176 / 340
188 / 570
189 / 569
5,954,629
9
While the invention has been described in conjunction
with preferred specific embodiment thereof, И will be under-
stood that this description is intended to illustrate and not
limit the scope of the invention, which is defined by the
following claims.
What is claimed is:
1. А brain wave inducing system comprising:
sensors for detecting brain waves of a user;
a band-pass filter lor extracting particular brain waves
10
light emitting means responsive to the stimulation signal
for emitting a stimulation light to the user.
2. The system according to claim 1 further comprising a
memory lor recording the extracted brain waves and for
Teproducing the recorded brain waves, and second selecting
means Гог selecting either of the recording or reproducing of
the brain waves.
3. ‘The system according to claim 1 wherein the sensors
including an «x wave included in a detected brain wave, 12 are mounted on ап сус mask to be attached to a forehead of
the band-pass filler comprising a first band-pass filler the user.
having a narrow pass band, and a second band-pass 4. The system according to claim 2 further comprising
filter having a wide pass band connected in parallel to detecting means for detecting a sleep falling point when the
said first band-pass filter; 15 User falls into sleep and producing a signal, the sccond
first selecting means for selecting one of the first and selecting means being provided to select the recording of the
second band-pass fillers, wherein said first band pass brain waves [rom the starting of the extraction of the brain
filter corresponds to an а wave іп ап cyc-closed rest yayes lo until receiving the signal of the sleep falling point.
state of the user and has a narrow pass filter corre- . ; > ; ;
sponding to the a wave іп ап eye-closed rest state of the 2 5. The system accordiug [0 claim 4 wherein the delecting
user, and wherein said second band pass filler corre- means detects the sleep falling point by detecting a time
sponds lo ап « wave in a sleep transient state of the user when ct wave appearance rate reduces 50% from a reference
and has a wide pass filter corresponding to an e. wave value.
in the slecp transient state of the user; 6. The system according to claim З wherein the eye mask
output means for producing a stimulation signal depen- 2s has а resilient member so as to be curved along the forehead.
dent on ап « wave extracted by a selected band-pass
filler; and ов ожо od
177 / 340
189 / 570
PDF SECTION:
UNITED STATES PATENTS.
E
191 / 569
United States Patent 9
Norris
[54] ACOUSTIC HETERODYNE DEVICE AND
METHOD
[75] Inventor: Elwood С. Norris, Poway, Calif.
[73] Assignee: American Technology Corporation,
Poway, Calif.
[21] Appl. No.: 684,311
[22] Led: Jul. 17, 1996
[51]. I CIS aout H04B 3/00
1521 95. С saq aa gaan trece 381/77; 381:79
[58] Field of Search... 381/79, 77, 82
[56] References Cited
U.S. PATENT DOCUMENTS
1,016,039 2/1927 Sprague .
1,951,669 3/1934 Ramsey.
2,461,344 271949 Olson.
3,012,222 12/1961 Hagemann .
3,398810 8/1968 Clark, IIT.
3.612211 10/1971 Clark, ПТ.
3,613,069 10/1971 Cary ct al. .
3,641,421 2/1972 Stover .
3,710,332 1/1973 Tischner el al. .
3,723,957 3/1973 Damon.
3,742,433 6/1973. Kay ct al. .
3,836,951 9/1974 Geren el al. .
4.207,571 6/1980 Passey.
4,245,136 171981 Kraucl, М.
4,378,596 3/1983 Clark.
4,418,404 11/1983 Gordon el al. .
4,593,160 6/1986 Nakamura .
4,823,908 4/1989 ТаваКа ct al. .
4,991,148 — 2/199] Gilchrist .
5,317,543 5,994 Grosch.
0500
5889870A
11] Patent Number: 5,889,870
[4] Date of Patent: Mar. 30, 1999
3,337,378 10/1994 ‘Tanishi .
OTHER PUBLICATIONS
Ultrasonic Ranging System—Polaroid.
Helmholtz (Excerpts from On Combinaton Toncs)—Edi-
tor's Comments on Paper 16.
Aoki, K., et al., “Parametric 1 .oudspeaker—Charaleristics of
Acoustic пей and Suitable Modulation of Carrier Ultra-
sound,” Electronics and Conununications in Japan, Part 3,
vol. 74, No. 9, pp. 76-82 (1991).
Makarov, S.N., et al., “Parametric Acoustic Nondirectional
Radiator," Acustica, vol. 77, pp. 240—242 (1992).
Westervell, P.L, “Parametric Acoustic Array," fhe Journal
of the Acoustic Society of America, vol. 35, No. 4, pp.
535-537 (1963).
Primary Examiner—]l'orester W. Isen
Attorney, Agent, or Firm—Thorpe, North & Western, LLP
[57] ABSTRACT
The present invention is the emission of new sonic or
subsonic compression waves Попа a region resonant cavily
or similar of interference of at least Iwo ultrasonic wave
trains. In onc embodiment, two ultrasonic emitters are
oriented toward the cavity so as to cause interference
between emitted ultrasonic wave trains. When Ше dillerence
in frequency between the lwo ulirasonic wave trains is in the
sonic or subsonic frequency range, à new sonic or subsonic
wave train of that frequency is emitted from within the
cavity or region of interference in accordance with the
principles of acoustical heterodyning. lhe preferred
embodiment is a system comprised of a single ultrasonic
radiating clement oriented toward the cavity emitting mul-
tiple waves.
6 Claims, 7 Drawing Sheets
179 / 340
191 / 570
U.S. Patent Mar. 30, 1999 Sheet 1 of 7 5,889,870
12 10
Fig. 1
Fig. 2
192 / 569 180 / 340 192 / 570
U.S. Patent Mar. 30, 1999 Sheet 2 of 7 5,889,870
_— а 9 а
pd
Fig. 4
193 / 569 181 / 340 193 /570
U.S. Patent Mar. 30, 1999 Sheet 3 of 7 5,889,870
Fig. 5A
Š
Ë
р)
š
=
<
Š
uy
с
D
Ш
9.
m
О
б
m
°
=
Š
>
е
359404 9S9NIHOLSZUH
194 / 569 182 / 340 194 / 570
U.S. Patent Mar. 30, 1999 Sheet 4 of 7 5,889,870
100000
10000
m
ёз 5
ц.
g
8
s 8 888888 8° 8
# 000;/8p
195 / 569 183 / 340 195 / 570
U.S. Patent Mar. 30, 1999 Sheet 5 of 7 5,889,870
Fig. 6B
——
zm
SR T
a,
Fig. 8
196 / 569 184 / 340 196 / 570
U.S. Patent Mar. 30, 1999 Sheet 6 of 7 5,889,870
pp СО
197 / 569 185 / 340 197 / 570
5,889,870
U.S. Patent Mar. 30, 1999 Sheet 7 of 7
92
90
Fig. 11
102
20 72 с
J
)))2)))))))
30 a
104
Fig. 12
EN
“ы
ER
9
ы ))))))) Ж
96
20
Fig. 13
186 / 340 198 / 570
198 / 569
199 / 569
5,889,870
1
ACOUSTIC HETERODYNE DEVICE AND
METHOD
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention pertains to compression wave generation.
Specifically, Ше present invention relates to a device and
method Гог indirectly generating a new sonic or subsonic
compression wave withoul the use of a direct radiating
tA
2
output into the same instrument or acoustic resonator. It is
apparent that such a solution is totally impractical.
In Ше real world, the challenge of reproducing sound has
been allocated to the speaker. ‘The operation of a loudspeaker
is relatively simple to understand when the interaction of the
components is explained. А speaker is а transducer which
receives energy in one form (electrical signals representative
of sound) and translates the energy to another form
(mechanical vibration). In a dynamic loudspeaker, an elec-
element al the source of the new compression wave genera- 1 trical current that is proportional to the strength and fre-
tion. quency of the signal to be broadcast is scat through a coil
2. State of the Art attached to а rigid membrane or cone. The coil moves inside
Sound waves in general аге wave-like movements of air a permanent magnel, and the magnetic field exerts a lorce on
or water molecules. Because these media are elastic and ,. the coil thal is proportional to the electrical current. ‘The
Е ае, бинте ‚у: 15 oscillating movement of the сой and the attached membrane
generally homogeneous, naturally occurring sound travels in io я à à ms
all directions radially from the source of gencration. А voice, Sets Up SOU nd waves in tho sur tounding air. In brief, pee
instrument or impact, for example, will radiate omni- duction of sound has heretofore required mechanical move-
directionally in a unitary, integrated form, carrying multiple ment of a diaphragm or plate. lo expecl a single diaphragm
frequencies, overtones, and a full range of dynamics that. 4, = plate to accurately supply both tig ие пиеш,
collectively contribute 10 an instantaneous sound perception и piccolo and the decp resonance of the base drum would
at the car. This perception of naturally occurring sound at a indeed be unreasonable. |
healthy саг is deemed to be “pure” when it corresponds to It is important to note, however, that when the listener at
the same acoustic content that existed at the point of origin. a live performance Е Га symphony hears this broad range ШІ
Because sound is а transient, temporary stale of motion 24 sound, he Tecelven win ап integrated тапет ча a "unified
within а media, it is nol sell-sustaining. Indeed, the first and combination of sound Waves, having а myriad of frequen-
second laws of thermodynamics require that the sound cics and amplitudes. This complex апау S responsively
eventually dissipate its motion into hcat or other forms of promulgated through ihe ar from попа пр нашое TOU
energy. Thercfore, if storage or preservation of the sound is ваг that is incredibly able to transfer the 1 ull experience to
desired, it is necessary Lo transmute such motion into a fixed 50 the brain. Indeed, the full range of audible signal (20 to
form of recording. This fixed form can then be recovered 20,000 Hz) 15 processed as 4 пас d experience, and
later by conversion of the fixed form back into sound waves. includes сава subsonic bass Vibrations, S Wolas other
In the earliest expericnces of recording, mechanical [тей iiM ак Impact the ЕЛЕНЕ елмен,
devices were moved by impact of the sound waves to [t is also important to note that tliis same "pure" sound
inscribe or etch a corresponding grove into a plate. Ву ss that arrives at Ше ear, сап be detected by a microphone and
positioning a needle or other tracking device over a set of conscquently recor ded onto a fixed media such as magnetic
moving grooves, crude reproduction of the original sound tape or compact disc. Although the microphone diaphragm
waves was accomplished. More sophisticated technologies may nol have the sensitivity of a human ear, modern
have developed which enable capture of sound waves in technology has been quite successful ш ellectively capturing
other fixed lorms such as magnetic, electronic, and optical до the lull range ol souud experience. within the recorded
media. Nevertheless, the same priuciple of sound reproduc- signal. For example, it 15 unnecessary to provide separate
tion has бесп applicd to recover this stored information, microphones for recording both low and high range frequen-
whether the response is generated by a mechanical mecha- cies. Instead, like the ear drum, the microphone, with its Ппу
nism or by digitally controlled laser reading devices. sensing membrane, captures the [ull audio spectrum as a
Specifically, stored signal is converted back to sound waves as 0 nificd ашау of sound waves and registers them as а
by recrealing movement of ап object, which then sets the composite signal that can then be recorded onto an appro-
surrounding air into motion corresponding to sound repro- = РА media.
duction. It is therefore clear that the microphone is not the primary
A primary goal of modern acoustic science is 10 reproduce limitation to elTective storage and subsequent reproduction
pure sound, based ou conversion of the electronic, magnetic, 50 Of “pure” sound. Rather, the challenge of accurate sound
mechanical or optical record into compression waves which reproduction arises with the attempt to transform the miero-
сап be detected at the саг. The ideal system would play all phone output to compr ession waves through a mechanical
original sound back through a resonating device comparable speaker. Accordingly, the locus ol effort for achieving a high
to that which produced the sound in the beginning. [n other quality unilied sound system has been to develop a complex
words, Ше violin sounds would be played back through a 55 speaker array which is able to respond to high, medium and
violin, regenerating the overtones and а myriad of other low range frequencics, combining appropriate resonance
dynamic influences that represent that instrument. Similarly, = chambers and sound coupling devices, to result in a closer
a piccolo would be played back through a device that simulation of the original sound experience.
generates the high lrequeucies, resonance aspects and over- This quest for improved sound reproduction has included
tones associated with this type of instrument. [n short, one 60 studies of problems dealing with (a) compensating for the
cannot expect a viola to sound like a viola in “pure” form if mass of the speaker diaphragm, (b) the resistance of air
sound reproduction is actuated Бу a mechanical wave gen- within an enclosed speaker, (c) the resonant chamber con-
erating device that does not embody unique characteristics figuration of the speaker, (d) Ше directional dillerences
of that instrument or voice. Accordingly, il would seem that between high and low lrequencies, (е) Ше phase variation of
the only practical way to reproduce Ше original "pure" 65 low versus high frequency wave trains, (f) the difficulty of
quality of sound would be to isolate cach instrument or coupling speaker elements to surrounding air, and (g) the
source, record its sound output, and then reproduce Ше loss of harmonics and secondary tones. Again, these aspects
187 / 340
199 / 570
200 / 569
5,889,870
3
represent just a few of the problems associated with recon-
structing the sound wave by means of a direct radiating
physical speaker.
As an example of just one ol these issues, overcoming the
mass of a speaker driver has remained a challenging prob-
lem. Obviously, Ше purpose of the speaker driver and
diaphragm is to produce a series of compression waves by
reciprocating back and forth to form a wave train. ‘The initial
design challenge is 19 compensate for resistance against
tA
4
concept that mechanical systems, such as speakers, are
required io reproduce audible sound. Clearly, it would be
very desirable іо provide a means of sound reproduction
which adopts a different approach, avoiding the many dif-
ficultics represented by the choice of moving a diaphragm or
speaker in order io generate sound.
OBJECTS AND SUMMARY OF TOL
INVENTION
[Lis an object of the present invention to provide a method
movement in speaker response Фос to inertia within the 1" and apparatus for indirectly emitting new sonic and subsonic
speaker mass itself. Once the speaker driver is зет in motion, wave trains from a region of air without using a dircet
however, the mass will seek io stay in motion, causing the radiating element to emit the wave trains.
driver to overshoot, requiring [further compensation lor It is another object to indirectly generate at least one new
delayed response lo reverse ils direction of travel. This sonic or subsonic wave train by using a by-product of
conflict of mass and inertia recurs thousands of times cach 15 interference berween at least two ultrasonic signals having
second as the speaker endeavors to generate the complex different frequencies equal to the at least onc new sonic or
аттау of waves of Ше original sound embodied in Ше subsonic wave train.
electrical signal received. It is still another object to cause at least (wo ultrasonic
In order to meet the а Шсийу of compensating Гог mass, wave trains to interact in accor dance with the principles of
as well as numerous other physical problems, speaker devel- 20 acoustical hetcrodyning 19 thereby extract intelligence from
opment has focused mainly on improving materials and s ееп wave rama. :
components as opposed to developing а different concept of Lis yet another object lo indirectly generate new sonic or
sound generation. Diaphragm improvements, cone construc- subsonic Weve trains by combining them with an ultrasonic
поп materials, techniques and design, suspensions, molor Согог Wave USINE amplitude modulation, emurng the coms
units, magnets, enclosures and other factors have been 25 bined signal from an ultrasonic transducer, causing interfer-
modified and improved. Nevertheless, the basic usc of a euce belween the carrier wave and another ultrasonic Пе-
reciprocaling mass remains unchanged, despite an efficiency quency wave (тат, lo thereby create the new sonic or
of less than 5 percent of the electrical power being converted subsonic Wane паша, : | —
to acoustic output. . It is still another object to affect a physical state ofa living
Electrostatic loudspeakers represent a different method- + being utilizing on indirectly created compression id
ology. Unlike the clectrodynamic loudspeaker with its conc [t is still yel another object lo generale а new compression
shaped diaphragm, the electrostatic loudspeaker uses a thin Ways which тв percep tible to human senses using al least муо
electrically conducting membrane. Surrounding the plate аге m perceptible Campressión. WAVES; but without directly
one or more fixed grids. When a signal voltage is applied lo _ 5 propagating the DEW COmPICSSIOn WAVE:
the elements, the electrostatic force produced causes the ~ Yet another object of the invention is to gencrate a new
diaphragm to vibrate. This low-mass diaphragm is particu- sonic or subsonic wave Irain without having lo overcome the
larly useful as a bigh-lrequency radiating element, and ils mass aud. associated inertial limitations of a conventional
operation can be extended 10 relatively low frequencies bv direct radiatiug element.
the use of a sulliciently large radiating area. m Still another object of the invention is to gener ате 8 new
Although clectrostatic speakers offer some advantages, sonic or su bsonic wave train without introducing, distortions
they arc large, expensive, incfficicnt and suffer from the lack or undesired h armonics otherwise inherent to а conventional
of point source radiated sound. Гог example, sound detec- direct radiating element.
Поп is accomplished by a microphone al a localized or Another object is lo indirectly generate and enhance a
approximate point source. To convert the detected sound to , NCW sonic ОГ subsonic wave train from within а resonant
а non-point source, such as a large electrostatic diaphragm, Cavity by emitting at least two ultrasonic wave trains into the
may create unnatural sound reproduction. Specifically, а resonant cavily.
radialing electrostatic speaker 5 feet in height is limited in its Yet another object is to omni-directionally generate a high
ability to simulate the delicate spatial image of a much Їтедиепсу wave train, thereby avoiding the highly locused
smaller piccolo or violin. so 30d directional nature of high frequency signal emissions
Another issuc in loudspeaker design is that the optimum typical of a conventional loudspeaker.
mass and dimensions for low frequency radiating elements Still yet another object is to generate a new sonic or
diller radically Пот those for high frequency. ‘This problem subsonic wave train iu a localized area without coupling to
is Lypically addressed by providing both woofer and tweeter an associaled environment or enclosure which would oth-
radiating elements for each channel of a loudspeaker system. ss erwise cause undesirable broadcasting of the sonic or sub-
The implications of this design arc highly undesirable. The sonic wave train.
phase shift introduced because of the differences іп time Yet another object is to generate a new sonic or subsonic
delay for high frequency signals traveling (i) the shorter wave irain wherein characteristics of the new sonic or
distance of the cone of a tweeter 10 a listener, versus (ii) the subsonic wave train are not limited by the characteristics of
substantially longer path for low frequency signals from Ше во a direct radiating element.
horn or woofer speaker to a listener's саг, can be in the range Another object of the invention is to emulate a sound
of thousands of percent in phase differential. wave detection process typical of an approximate point-
‘The preceding discussion of speaker technology is recited source detection device such as a microphone, but without
primarily to emphasize the historical dilliculty of changing providing a physical detection device at a detection location.
a stored form of sound to a compression wave capable of 65 —— Another object is to control the volume of a new sonic or
reproducing sound in its original form. Nevertheless, the subsonic wave train by manipulating the degree of interac-
prior art has been virtually dominated for sixty years by the tion of the at least two ultrasonic frequency wave trains.
188 / 340
200 / 570
201 / 569
5,889,870
5
Still another object is to emit a new sonic or subsonic
wave train from a region of air as a by-product of modu-
lating a single ultrasonic wave train emitted Пот a single
ultrasonic transducer into the region in accordance with the
principles of acoustical heterodyning.
‘The present invention is embodied in a system which
indirectly generales new sonic or subsonic waves trains. Іп
one embodiment, a new sonic or subsonic wave train is
emitted from a region of interference of at least two ultra-
sonic wave trains emitled from al least two ultrasonic
tA
6
Another aspect which is helpful to utilize Ше present
invention is to understand Ше nature of Ше transmission
medium. More specilically, tbe region of air in which ап
acoustical heierodyning ellect occurs is referred io as the
transmission mcdium. It is well known that the transmission
medium of air provides an clastic medium for the ргорара-
tion of sound waves. Thus, prior ай research has treated air
as a passive element of the sound reproduction process. Air
simply waits to be moved by a compression wave.
transducers. ‘The principle of operation is based оп incorpo- B Conscqueatly, little pr actical attention has been devoted
rating retrievable intelligence onto an ultrasonic carrier 19 the nature of air when it behaves non-lincarly. In the past,
wave. The intelligence is retrieved as the desirable such non-linearity has perhaps been perceived as ап obstacle
by-product of interference of the ultrasonic carrier wave 19 accurate sound reproduction. This is because it 15 under-
train and another ultrasonic wave train. The ultrasonic wave Stood by those skilled in the art thal in extreme conditions,
trains interlere within a region of non-linearity in accor- 17 alr molecules arc less and less able to follow the vibration of
dance with principles identified by the inventor as “acous- а compression wave, such as that produced by a diaphragm.
tical heterodyning,” and thereby generate by-products which Therefore, the tendency of research has been lo avoid
include the dillerence and the sum of the two ultrasonic non-linear conditions.
wave trains. А In contrast, the preseut invention appears to lavor Ше
А system which easily demonsirates the principle of ^" existence of a non-linear transmission medium in order to
acoustical hcterodyning comprises two ultrasonic frequency bring about the required heterodyning effect. Although air is
transducers which are oriented so as to cause interference naturally non-linear when a compression wave moves
between emitted ultrasonic wave trains. When the difference through it, the degree of non-linearity is relatively unob-
in frequency between the two ultrasonic wave trains is in the ,. servable or inconsequenti al. However, when ultrasonic com-
sonic or subsonic Педиепсу range, the dillerence in fre- ^ pression waves arc emitted so as to interfere in air, the
quency is generated as а new, audible sonic ог new subsonic non-lincarity causes a surprising and unexpected result
wave train emanating outward from within the region of which will be explained and referred to as Ше acoustical
heterodyning interlerence. heterodyning elect or process.
^ different embodiment of the system provides the advan- À The present invention draws on a variety of technologies
tage оГ being comprised of only one ultrasouic direct radi- and aspects which have sometimes perecived as unrelated
ating element. The advantage is not only in the decreased topics. These aspects of the invention include 1) indirectly
amount of hardware, but the perfect alignment of the two generating а new sonic, subsonic or ultrasonic compression
interfering ultrasonic wave trains because they are emitted wave, 2) superimposing intelligence on an ultrasonic carrier
from the same radiating element. In effect, the new sonic or ¿ç Wave and reirieving the inielligence as the indirectly gen-
subsonic wave train appears to be generated directly from crated compression wave, 3) causing at lcast two ultrasonic
the ultrasonic emitter. If it were not for the inescapable | compression waves to interact in air and using the
conclusion that the ultrasonic emitter cannot itself generate by-product of the interference, 4) using the principle of
sonic or subsonic lIrequencies, plus the audible evidence that acoustical heterodyning to indirectly generate the new com-
Ше sound is not emanating directly [rom the emitter, one 44 pression wave, 5) generaling the new compression wave
might be deceived, from а relatively massless radiating element to avoid the
The importance of the ficst embodiment is that it teaches distortion and undesirable harmonics of conventional dircet
the concept of generating а new sonic or subsonic wave train radiating elements, 6) allecting a physical state of a living
as а result of the interference between two ultrasonic wave being by generating subsonic frequencies in close proximity
trains in accordance with the principles of acoustical het- 45 thereto, 7) generating an approximate point-source of sound
сгодупшр. In essence, it is casier to sce that two ultrasonic that is phase coherent over the entire audio spectrum, 8)
wave trains arc coming from two ultrasonic emitters. But the eliminating distortion in playback or broadcasting оғ sound,
principle of acoustical heterodyning taught by this first 9) eliminating Ше “beaming” phenomenon inherent in emis-
embodiment prepares the way lor understanding how the sion of high frequency compression waves from a direct
second embodiment functions. И becomes apparent that the so radiating clement, 10) generating а new sonic or subsonic
same acoustical heterodyning principle applics when it is compression wave which is independent of the characteris-
understood which wave trains аге interfering in space. tics of the direct radiating element, and 11) ше detection ol
A key aspect of the invention is the discovery that by sound without using a direct detection device at a detection
superimposing sonic or subsonic intelligence onto an ultra- location.
sonic carrier wave, this intelligence can be retrieved as а 55 ПІ should be remembered that all of these aspects of the
new sonic or subsonic wave train. Whether the ultrasonic present invention arc possible without using a speaker or
wave trains are generated from two emitters or from a single other form of direct radiating structure. Furthermore, these
emitter, the ellect is the same. sonic or subsonic Irequencies are generated absolutely Пее
Another aspect of the invention is the indirect generation of distortion and in a generally omni-directional orientation.
of new compression waves without having to overcome the во The surprising result is the ability to recreate “pure” sound
problems inherent to mass and the associated limitations of in the same form as when it was originally captured at a
inertia of a conventional direct radiating clement. The microphone or other recording system.
present invention eliminates a direct radiating element as the These and other objects, features, advantages and alter-
source of a new compression wave so that Ше desired sound native aspects of the present invention will become apparent
is generaled directly from a region of air and without the 65 to those skilled iu Ше ай from a consideration of the
several forms of distortion all associated with direct radiat- following detailed deseription, taken in combination with
ing speakers. the accompanying drawings.
189 / 340
201 / 570
202 / 569
5,889,870
7
BRIEF DESCRIPTION ОЕ THE DRAWINGS
FIG. 1 is a block diagram of the components of a state of
the art conventional loudspeaker system.
FIG. 2 is a block diagram ofthe components of an indirect
compression wave generation system which is buili in
accordance with Ше principles ol one embodiment of the
present invention.
FIG. 3 is an illustration of the indirect and new compres-
sion wave eencration using the apparatus of FIG. 2, includ-
tA
8
presently looks at ways to improve the physical radiating
element, such as the loudspeaker 10. The loudspeaker 10
functions as a transducer, attempting to accurately reproduce
sound recorded in an analog or preferably a digital format by
converting an clectrical signal into compression waves 14.
Therefore, generating compression waves has previously
been a direct process as defined above. Vhe reproduced
sound is generated direcily by a physical radiating element
which vibrates at the frequency or frequencics which drive
1b it. This vibration typically drives a loudspeaker cone or
ing the acoustical heterodyning interlerence effect. diaphragm, which creates compression waves the human car
ИС. 4 is a block diagram of the components of an indirect can hear when within the range of 20 to 20,000 cycles per
compression wave generation system. second. l'or example, if the diaphragm vibrates al 1500
FIG. ЗА is а graph showing how air responds increasingly cycles per second, an audible tone of 1500 Hz is generated.
non-lincarly as the amplitude or intensity of sound increases, 15 Before proceeding further, it will be helpful to define
FIG. 5B is a graph showing when air responds non- several terms to be used hereinafter. A “signal source” will
linearly to a specific signal of a defined Педиепсу and interchangeably refer to a “signal generator" or "amplifier"
amplitude. which provides electrical signals representative of compres-
МО. 6A is a block diagram of the components of an sion waves to be emitted from a speaker. The term "speaker"
indirect compression wave generation system. 20 will interchangeably refer to the terms “transducer”,
FIG. 6B is an alternative embodiment of FIG. 6A. "emitter", “loudspeaker”, "diaphragm", “physical radiating
f ; š А Е > element" or “direct radiating element” which converts Ше
FIG. 7 is an alternative configuration of ultrasonic frc- "келге eene ia ci Жай аЙ угш. гайы adits
queney transducers to indirectly pencrate compression зү ы vena ` 5 papapas БЫ ае
wares ,, Pression waves, Тіс term "compression wave will inter-
ARP | А : . 25 changeably refer to the terms “sound wave”, "longitudinal
НО. 8 is another alternative configuration of ultrasonic wave” and “wave train” which are sonic, subsonic and
frequency transducers lo indirectly generale compression ultrasonic waves propagating through a transmission
ЖАУ | | | | | | medium such as air.
FIG. 9 5 8 illustration of a. resonant cavity with two The present invention in a preferred embodiment teaches
ulirasonic frequency signals being emitted Гот two trans- 50 a method and apparatus for indirectly generating а new
quo compression wave. Indirect gencration refers to Ше absence
МО. 10 is an illustration of a resonant cavity with two of a direct radiating element at the source of the new
ultrasonic frequency signals being emitted from onc trans- compression wave generalion. Surprisingly, there is по
ducer, __ physical radiating clement vibrating at the frequency of the
FIG. П is a diagram of a hearing aid and headphones 35 newly generated compression wave. Instead, air molecules
where the human ear canal is the resonant cavily. arc caused to vibrate at the desired sonic, subsonic or
МО. 12 is a block diagram illustrating using the present ultrasonic frequency to thereby lunction as the radiating
invention 10 detect sound. element and generate the new compression wave. The air
ПО. 13 is an embodiment which teaches reflection of the m itself becomes the direct radiating clement, and becomes an
ultrasonic frequency signals to develop acoustical effects. indirect source of the compression wave.
к | rM n" Of prcatest interest to the present invention аге both sonic
DETAILED DESCRIPTION OF TOE and subsonic frequencies. lhis is largely due to the difficulty
INVENTION of directly generating these lrequencies without distortion.
Reference will now be made to the drawings in which the 45 In contrast, it is thc папис of ultrasonic frequencies to bc
various elements of the present invention will Бе piven capable of generation with much greater precision and with
numerical designations and in which the invention will be less distortion. This occurs because the radiating clement is
discussed so as lo enable one skilled in the art to make and typically more ellicient, smaller in size, and is less massive.
use the invention. Accordingly, the ultrasonic radiating element is not subject
‘The present invention is a dramatic departure [rom the «o 19 the same causes of distortion or to the same degree as arc
teachings of the present state of the art. The creation of conventional speakers. Although it should be remembered
compression waves is gencrally perceived to be a direct that the invention can generate new Compression waves al
process. A direct process is defincd as causing а radiating ultrasonic, sonic or subsonic frequencies indirectly, the
element 10 to vibrate at a desired frequency as shown in present focus looks al more significant applications with
L1G. 1. The system of PIG. 1 is typically used to directly 55 SPEC to reproduction of music, voicc and all other forms
generate audible and inaudible compression waves, both Ё Sound.
above and below the range of human hearing. A conven- To generate a new compression wave, the present inven-
tional compression wave generaling system is thus com- поп Г) makes use of al least two ultrasonic signals, 2)
prised of a speaker element 10 which can be any dynamic, superimposes a desired sonic or subsonic signal onto one or
electrostatic or other direct radiating element, and a signal бо both of the ultrasonic signals, 3) cmits the ultrasonic signals
source such as a signal generator or amplificr 12. The signal from at least onc ultrasonic emitter 4) causes the ultrasonic
source 12 supplies an electrical signal representative of а signals to interfere according to the principles of acoustical
compression wave having a specific lrequency or frequen- heterodyning, and 5) generales a new compression wave
cies al which the speaker element 10 will vibrate to produce Irom a region of heterodyning interference of the ultrasonic
compression waves 14. 65 Compression waves.
To improve the quality of sound from a sound reproduc- The advantages of this arrangement arc immediately
tion system such as in FIG. 1, a person skilled in the art observable. For example, the ultrasonic component waves
190 / 340
202 / 570
203 / 569
5,889,870
9
do not impact upon the human car in a perceptible form and
are therelore non-disiracting. Consequently, only the desired
new compression wave is perceived by a listener and in a
form capable of recreating the original dynamics of more
ideal sound reproduction.
Introduction of the present invention is best understoad by
reference to PIG. 2. Other prelerred embodiments will be
explained hereafter, based on the principles of this initial
discussion.
tA
10
produce a desired effect. Furthermore, the illustration of
opposing and generally coaxial compression waves 30, 32
should not be thought to depict the only orientation that the
waves can have.
It is worth noting before proceeding further that the
acoustical heterodvning effect has been proven empirically,
The evidence lies in the fact that at least onc new wave is
crealed. The new sonic or subsonic compression wave 36 is
verifiable by direci audible detection as well as by measur-
Indirect compression wave generation is accomplished in 1 ing the frequency with an audio spectrum analyzer.
a first embodiment as illustrated in FIG. 2. The fundamental However, unlike direct audible detection, the sum of both
clements of the system include at least two ultrasonic Педиепстез can only be verified through measurement using
acoustical transducers 20, an ultrasonic signal source 22, a an instrument such as the audio spectrum analyzer. Both the
means lor combining signals 24, and an input 26 lo the sum and the difference һауе beeu measured to verily the
means for combining signals which provides a signal to Бе 15 accuracy of these predicted results.
superimposed upon a carrier signal. The ultrasonic signal As can be surmised, the particular acoustical heterodya-
source 22 also luuctions as a means for controlling the ing effect which is of interest to the present invention is the
frequency of signals being emitted from Ше at least two difference or Педиепсу subtraction of one ultrasonic wave
ultrasonic acoustical transducers 20. The dotted line 28 train relative lo another. Consider a specific example which
indicates that in this first embodiment, the orientation of the 2? explicitly provides the result of acoustically heterodyning
transducers 20 arc coaxial. two different ultrasonic compression waves 30, 32. Assume
The apparatus above is able to function as described the existence of a first ultrasonic frequency wave train (first
because the compression waves 30, 32 inierlere т air fundamental wave) 30 of 100,000 Пух. Assume a second
according to the principles of acoustical heterodyning (а „ ultrasonic wave train (second fundamental wave) 34 occurs
phrase chosen by the inventor which describes the сест). <7 аг 100,900 Hz. An audible tone of 900 Hz is heard as the
Acoustical heterodyning is somewhat of a mechanical coun- result of the first and the second ultrasonic wave trains
terpart lo the electrical heterodyning effect which takes place interacting when one or both are of sufficient amplitude. The
in а non-linear circuit. l'or example, amplitude modulation Irequency subtraction caused by Ше acoustical heterodyning
in an electrical circuit is a helerodyning process. The bel- _ effect results in а 900 Их frequency lone being generated and
сгодупе process itself is simply the creation of two new 3° heard as а new compression wave from a region of inter-
waves. The new waves are the sum and the difference of two ference.,
fundamental waves. The generation ol a single-frequency merely illustrates
In acoustical heterodyning, the new waves equalling the the core inventive principle. A greater appreciation of poten-
sum and dillerence of the fundamental waves are observed ~; Па! for acoustic heterodyning is found in the following
to occur when at least two ultrasonic compression waves 7^" applications. For example, if a single new uni-frequency
interact or interfere in air. Presently, acoustical heterodyning compression wave can be generated, it should be realized
has only been observed when both fundamental waves are thai even bass intense, multi-frequency signals such as live
ultrasonic, thus generally above 20 КП. music, a voice or a transmission received via radio or
The preferred transmission medium ol the present inven- 40 television can be апр Пей and played using the present
tion is air because it is a highly compressible medium that invention. A tiny ultrasonic frequency transducer in a pocket
responds non-lincarly under different amplitudes. This non- can conceivably reproduce with perfect clarity all the
lincarity of air is what enables the heterodyning process to recorded frequencies of a live symphonic recording, perhaps
lake place without using an electrical circuit. Полуемег, it even approaching the experience of being there.
should be remembered Ша any compressible fluid can 44 Returning to a more detailed discussion of specific ele-
function as the transmission medium if desired. ments of FIG. 2, an important and practical clement of the
FIG. 3 illustrates that the indirect generation of a new invention is the single ultrasonic signal source 22 being used
compression wave is made possible by the unexpected io supply the electrical signals representing the ultrasonic
discovery that two ultrasonic wave trains 30, 32 experience Irequency wave trains 30, 32. The advantage of this arrange-
а form of the acoustical heterodyning effect іп а non-linear 50 ment is that signal differences that might otherwise occur
acoustical transmission medium such as air when they duc to variations in temperature or performance of two
interfere. Air will rcspond more and more non-lincarly in а separate signal generators would likely [сад to drift between
region 34 as amplitude and frequency increase. This region the Педиепсу values of the ultrasonic wave trains 30, 32.
34 will extend as far as the compression waves 30, 32 are Furthermore, because ii is the dillerence in frequency
interfering with each other. 55 between the two ultrasonic wave trains 30, 32 which is
As related above, the acoustical heterodyning effect ultimately the frequency of interest, it is important to mini-
results in thc creation of two new compression waves, the mize unwanted frequency variations of the ultrasonic wave
sum and the difference of ultrasonic compression waves 30, ans 30, 3.
32. The sum is an ultrasonic wave which is of little interest To eliminate drill, a single ultrasonic output source 22
and is therefore not shown. The dillerence, however, сап be 60 generates а base frequency for both ultrasonic wave trains
sonic or subsonic, and is shown as a compression wave 36 30), 32 so that the wave trains 30, 32 will drift together, if at
which is emitted generally omni-dircetionally from the all. This configuration thus makes it casier to precisely
region of interference 34. The shape of the new wave is control the dillerence in lrequencies and ultimately Ше
generally dictated by the shape of the region of interference Irequencies of the new compression wave.
34. In this illustration, the region 34 will be generally 65 116.2 also lists as a component of the system a means Гог
cylindrical as would be scen if drawn in three dimensions. combining signals 24. This device performs the function of
The shape of the region 34 can, however, be modified to modifying one or both of the ultrasonic wave trains 30, 32
191 / 340
203 / 570
204 / 569
5,889,870
11
being generated Бу the ultrasonic signal source 22. This
modification consists of the means for combining signals 24
by combining a first ultrasonic signal 38 with an electrical
signal 40, representing the new compression wave 42 to be
generated. The combination is defined as the sum of the first
ulirasonic signal 38 and Ше desired compression wave 42
and is transmitied as the second ultrasonic signal 42.
The method of combining signals 38 and 40 in the present
invention is preferably accomplished through amplitude
modulation. Therelore the means lor combining signals 24
12
FIG. 6A illustrates the preferred embodiment of the
invention. [n а comparison with ПО. 2, а significant differ-
ence is the elimination of one ultrasonic transducer 20.
Otherwise, the remaining ulirasonic transducer 20, the
means for combining signals 24 and the ultrasonic signal
source 22 remain substantially the same. It would seem
counter-intuitive, however, to think that this arrangement is
БИП able to accomplish the objectives of the present inven-
tion. However, an analysis of the ultrasonic compression
б wave be v t 7 ж о fa
in the first embodiment is an amplitude modulator. 110. 2A ш 272 аи ши the Acoustical ner
illustrates that amplitude modulation creates a signal having 2 ien nn BT © 7
a fundamental frequency 60, an upper sideband 62, and a | l'irst, the electrical signals involved are the first ultrasonic
lower sideband 64. In this invention, the upper sideband 62 signal 66 lico is the fundamental Ба ane the гое
is used because il represents а non-inverled signal which |; signal ú which тер TURN the Bew some or subsonic Wave
carries the information that will become the new "diller- ^ © be combined with the ultrasonic signal 66. The combi-
ence” compression wave, nation of the signals 66, 68 creates à new cleetrical signal 70
It might be apparcat that if the electrical signal which will composite as a new upper sideband that is the sum of signals
benome the how compression wave 62 is amplitude móði- 66 and 68, along with signal 66, both ol which are emitted
lated onto a l'undamental frequency 60, thal the ultrasonic ap пош the шше transducer 20 as а compression Waye 76.
compression wave 30 or 32 (whichever is being modulated) ~~ А listener will hear the new compression Wave 76 from а
needs по demodulation in order то be heard as the new region of interference 74 which eencrally can begin at a
compression wave 62. The last clements of the system transmitting face of the ultrasonic transducer 20. Except for
shown in FIG. 2 are the two ultrasonic acoustical transducers the audible evidence to the contrary, this might lead the
20. ‘These acoustical transducers 20 аге designed to emit s hstener іо incorrectly conclude that the ultrasonic transducer
compression waves al ultrasouic Irequencies. Examples of 20 is generating the пе Compression. Wave 76. By
transducers 20 can be piczoclectric or clectrostatic devices, definition, the ultrasonic transducer 20 cannot directly gen-
but may obviously include other radiating, elements for the erale audible Irequencies. Therefore, what one hears is the
appropriate Irequency range. interfering. ul trasonic compression waves iuleracting iu
While the first embodiment uses a single ultrasonic signal 50 accordance with the acoustical heterodyning ellect. Ц was
source 22, it should be realized that it is possible to provide discovered that the two ultraso ше compiossion WAVES are
separately generated clectrical signals to the ultrasonic trans- created from 1) the new electrical signal 70, and 2) the first
ducers 20. FIG. 4 illustrates using, two separate ultrasonic ultrasonic signal 66. [езе respective compression waves
signal sources 44, 46. The risk of this configuration is that corresponding 10 signals 66 and 70 m propagated at the
frequency drift becomes a possibility. As a practical maller, 55 transducer 20, providing the required two ultrasonic wave
this embodiment might also require some type of synchro- trains for acoustical hetcrodyaing interference.
nization between the two ultrasonic signal sources 44, 46. FIG. 6B is also provided to show an alternative arrangc-
For example, a synchronizing controller 48 might coordinate meni of components which more intuitively illustrates the
emission of the two ultrasonic frequency signals 30, 32. iwo distinct ultrasonic SOIpIPesIOn WAVES 66 and 70 being
МО. 5A is a graph provided to illustrate the principle of 40 transmitted іо Ше ultrasonic transducer 20 lor emission
acoustical heterodyning by showing the relationship therefrom. The only meaningful difference between the two
between the amplitude of a signal and the non-linearity of air embodiments is that PARE ultr OMe signals sources: 22
in response to that signal. The restoring force is the force are shown Гог each of the ultrasonic compression waves,
which a molecule of air will exert lo get back lo equilibrium The embodiments of FIG. 6A ог 613 are prelerred Гог
when it is displaced. I! air were linear, Newion’s laws would 45 Many reasons. Гог example, the systems have one less
teach us that air would respond to a given force which transducer 20, and will therefore be less expensive to
displaces it with an equal and opposite force. However, the produce. The systems will also be lighter, smaller and, most
graph illustrates that the restoring force docs not respond importantly, will have the greatest efficiency.
linearly (which would be represented by a straight line) as The aspect of efficiency requires further discussion to
the amplitude of a signal increases. Instead, the equation of зо understand some of the implications of the various embodi-
the curve 52 is y=x+x", where air responds with a lincar ments. Whereas the first embodiment shown in FIG. 2
component x, as well as a non-lincar component x^. The requires orientation of the ultrasonic transducers 20, no
curve 52 thus represents that as amplitude of a signal orientation is required in 110. 6 because Ше single trans-
becomes significant, the non-linear response of air begins to ducer 20 functions as the radiating element for both inter-
increase more rapidly than the linear component in accor- ss lering signals.
dance with the equation. Orientation of ultrasonic transducers 20 is important
FIG. 3B is a graph provided to illustrate properties which because the system of FIG. 1 can be altered so as not to
the signal must exhibit so that air will respond to it non- generate апу new compression wave. For example, if the
linearly. lhe x-axis represents Педиепсу of Ше signal on а transducers 20 are oriented so that the ultrasonic compres-
logarithmic scale. The y-axis represents Ше degree ol 60 sion waves 30, 32 never substantially cross, no new com-
absorption in air by dB per 1000 feet. As shown, the line 30 pression wave can be ercated. Therefore, FIG. 7 showing а
is nearly flat up to about 10 KHz. This is consistent with the slightly convergent path and FIG. 8 showing а gencrally
experimental resulis confirming that sound waves ai lower parallel path both depict ultrasonic transducer 20 orienta-
amplitudes do not appear to develop significant acoustical tions which will generally create sufficiently large regions of
heterodyning. Air becomes substantially more non-linear as 65 interference so Ша а new compression will be generated.
amplitude increases, thus enabling interference in accor- However, neither of these orientations appear to generate as
dance with the principles of acoustical hetcrodyning. significant a region of interference as the orientations of
192 / 340
204 / 570
205 / 569
5,889,870
13
FIGS. 1 or 6. duc to Ше greater degree of interference
represented. Ihis greater elliciency translates into greater
energy transfer io Ше new compression wave and conse-
quenily to а stronger or louder new wave.
In contrast, the preferred embodiment will always gener-
ate a new compression wave which has the greatest cffi-
ciency. That is because no onentation of two ultrasonic
transducers 20 will ever match or exceed the perfect coaxial
relationship obtained when using the same ultrasonic trans-
tA
14
to the contrary, the frequency response of a conventional
loudspeaker 15 поі truly flat. Instead, it is a function of Ше
{уре of frequency (bass, intermediate, or bigh) which it is
inherently best suited lor emitting. Whereas speaker shape,
рсошеиу, and composition directly affect the inherent
speaker character, acoustical heterodyne wave generation
utilizes the natural response of air to avoid geometry and
composition issues and to achieve a truly flat. frequency
response for sound generation.
ducer 20 to emit both ultrasonic compression waves. This 1^ In general, it should be noted that this aspect of the present
coaxial propagation from a single transducer would there- invention means that the final step in achieving truly indircet
fore yield the maximum inierlerence pattern and most sound generation has been achieved. While the state of the
ellicient compression wave generation. ап has advanced the ability to convert an analog signal to a
Before moving lo other aspects of the invention, il is digital recording, and to even process the signal digitally, the
important to realize that unusual sound effeets are possible 15 quality of sound reproduction remains limited by the char-
with the highly directional ultrasonic transducers 20. It has acteristics of the analog transducer which has always been
been observed that rellecting the at least two ultrasonic wave required as a speaker element. This is no longer the case
trains al an object or surface causes the rellected waves to because the present invention achieves distortion free sound
give an impression of localized source. Іп other words, the which is not hindered by a dircet radiating clement, with its
reflected new compression wave appears to be coming from 20 attendant mass and inertial limitations.
the object or surface of reflection. Distortion frec sound implics that the present invention
This is represented in FIG. 13 and can be used to simulate maintains phase coherency relative to the originally
a vanely оГ interesting acoustical ellects, including three recorded sound. Conventional speaker systems do not have
dimensional sound. By simply directing the orientation of | this capacity because the frequency spectrum is broken apart
the ultrasonic transducer 20 toward a ceiling or wall 96, onc <7 by a cross-over network for propagation by the most suitable
can simulate the experience of sound emanating from that speaker clement (woofer, midrange or tweeter). By climi-
location. П the transducer target is placed in motion, the naling the direct radiating element, the present invention
moving reflective location creates an impression of move- makes obsolete the conventional cross-over network. ‘This
meni [ог the sound or object being represented. By control- _ enables realization of a virtual or near point-source of sound.
ling the orientation of the transducer with computer drivers, sid Another application of the present invention involves
sound reproduction can be localized to individual faces on a 1 oobtrusively ecnerating, crowd-controlling subsonic sound
movie screen or even ОЇ the screen in an overhead position, waves, Very low frequencies, such as thosc around 12 Hz,
moving vehicles or aircraft, or any myriad of other sound have been shown 10 nauseale or disorient human beings and
effects which can now only be imagined, 55 other animals. Prior elloris in using low frequency disori-
A startling consequence of the present invention is the 7" entation has been hampered by a limited ability for localized
generation of a new omni-directional compression wave. application. The present invention has demonstrated its
Specifically, the new compression wave will generally radi- adaptation Гог rellected amplification, and thereby allows а
ale outward omni-directionally [rom a region of more locused field of inlluence. l'or example, acoustic
interlerence, generally in accordance with the shape of the ,, heterodyne generation ol low frequency sound could be
region. However, the remarkable control which Ше present directed to a building, window or other reflective surface
invention provides over the shape of the region of interfer- near a group of disorderly persons. The primary affect of this
ence enables a perception of the described directionality to disorienting sound would be in the immediate area of
be manipulated in unexpected ways. reflection, avoiding undesirable application to innocent
l'or example, one or two ultrasonic transducers might be 4g bystanders,
aimed at a wall or other object. The increased amount of Other advantages arise dircetly from the unique nature of
interference between two ultrasonic compression waves the ultrasonic transducers 20. Because of their small size and
which will occur because of the reflection will cause most of low mass, such transducers arc generally not subject to the
the sound to be generated omnui-directionallv from near the many limitations and drawbacks of conventional radiating
object being reflected from. Likewise, bringing the two so elements used in loudspeakers. l'urthermore, the use of
ultrasonic frequency transducers 20 of FIG. 2 closer together ultrasonic transducers 20 at extremely high frequencies
limits the length of interference and consequently more avoids the distortion, harmonics and other undesirable fea-
closely approximates а near point-source of sound. tures of a direct radiating element which must reproduce
Another significant advantage of the present invention is sound directly іп the low, mid and high [requency ranges.
that sound is reproduced [rom а relatively massless radiating 55 Consequently, the many l'avorable acoustic properties of a
clement. In the region of interference, and consequently at relatively distortion free ultrasonic transducer system can
the location of new compression wave generation, there is now be transferred indirectly into sonic and subsonic
no direct radiating element. This l'eature of sound generation by-products.
by acoustical heterodyuing can substantially eliminate dis- L1G. 9 illustrates an additional aspect of the present
tortion ellects, most of which are caused by the radiating 60 invention relating to ап ability to generate and enhance
element or conventional speakers. For cxample, harmonies sound within a broadly resonant cavity 80. A resonant cavity
and standing waves on a loudspeaker cone, cone overshoot 80 is any cavity 80 which enables interacting ultrasonic
and сопе undershoot caused by iuertia, and the imperfect compression waves 30, 32 to interfere in accordance with
surface of the cone itself are all factors which contribute to the principles of acoustical heterodyning. Although Ше
signal distortion attributable to a dircet radiating clement. 65 broadly resonant cavily 80 is not necessary to create Ше
А direct physical radiating clement has other undesirable effect of interference, it seems to enhance or amplify the
characteristics as well. Despite certain manufacturer claims effect by increasing interference, as well as reinforcing the
193 / 340
205 / 570
206 / 569
5,889,870
15
audio byproduct ог “difference” frequencies. This means
that two ultrasonic Педиепсу signals 30, 32 сап be trans-
mitted inio the cavity 80 from almost any perspective. Гог
example, ПО. 9 shows two ultrasonic frequency transducers
20 emitting ultrasonic frequency signals 30, 32 into cavity
80. The signals 30, 32 arc reflected off the walls of cavity 80
a mulliple numbers of times to increase interference.
ИС. 10 shows an improved configuration of the broadly
resonant сауну of 110. 9 which only requires a single
tA
16
Ап interesting twist of thc invention 15 a reverse applica-
tion of the technology for sound detection. In other words,
instead of reproducing sound, the invention might be used to
detect sound as shown in FIG. 12. More specifically, the
invention can function as a substitute for a point-source
sound detection device such as a microphone. Typically, a
microphone musi be physically positioned al a desired
location of sound detection in order to operate. The present
invention coables compression waves to be converted into
an electrical signal by a transducer 20 without providing a
ultrasonic transducer 20 to generate а now compression р physical microphone element at a detection location.
wave. Тіс system is improved becau se of the perfect coaxial Essentially, а single transducer 20 might be used to focus
relationship between the two ultrasonic compression waves ultrasonic compression waves 30 at the desired detection
30, 32. location 102. Acoustical vibrations, such as a voice or music,
One implication of the broadly resonant cavity 80 of — will interact with the ultrasonic compression wave 30. Ву
FIGS. 9 and 10 is that thc human car canal is also a broadly 12 monitoring a decrease in output level of the ultrasonic
resonant cavity, and can thus be used to enhance Ше new compression wave 30, it should be possible to determine the
compression wave. This result offers a particular advantage frequencies of the audible compression wave which is
for the headphone and hearing aid industry. l'or example, a impacting on the ultrasonic compression wave 30. This
hearing aid 90 as shown in PIG. И which embodies Ве might be done by using a wavelorm analyzer 104 to deter-
present invention сап be used to reproduce the entire audio ^" mine the decrease in output level caused by coupling of the
spectrum of sounds for a listener, enabling а high fidelity ultrasonic compression wave 30 with the audible sound
reproduction, rather than the characteristic “tinny” sound of waves 102. It is to be understood that the above-described
a conventional hearing aid. Likewise, any headphone or embodiments are only illustrative of the application of the
headset 92 can be modified to take advantage of the present principles of the present invention. Numerous modifications
invention, and generally with less weight and size than ^' and alternative arrangements may be devised by those
conventional systems with a dramatic extension to fre- skilled in the art without departing from the spirit and scope
quency response. of the present invention. ‘The appended claims are iniended
Another interesting aspect of the invention lacilitates to cover such modifications and arrangements.
privacy of communication as part of a wireless system. This ., — ll is 10 be understood Ша Ше preceding description is
arises because of the “beaming” effect inherent with the use © given to illustrate various embodiments of the present inven-
of an ultrasonic transducer 20. By nature, ultrasonic com- tive concepts. The specific examples are not to be considered
pression waves propagate in а narrow Бсаш, which can as limiting, except in accordance with the following claims.
easily be targeted on specific objectis or locations. It is What is claimed is:
therefore possible to aim a transducer 20 across a noisy ог - 1. ^ system lor indirectly generating and enbancing al
crowded room and direct audible messages only into an car least one audible frequency from within a resonant cavity by
of an intended listener. Those around the listener would Бе interaction between at least two ultrasonic frequency signals
unaware of the audible communication because of the of different Педиепсу, said system comprising:
non-reflective character of the ear and the narrow beam a resonant cavily which enables interacting ulirasonic
width of the ultrasonic waves. Private instructions could 4, signals to interfere in accordance with acoustic hetero-
therefore be given on radio and television production areas, dyning to generate an audible sound output within air
performance stages for cucing, and other applications where contained within the resonant cavity, said resonant
one-way prompting would be helpful. cavily Including an opening lor permitting entry of the
Surprisingly, the present invention can also eliminate ultrasonic signals;
unwanted environmental noise pollution. Our society has 4g an ultrasonic [requency emiller contained within one of a
coined the phrase “boombox” to refer to portable sterco sterco headphone, a hearing aid, or an audio headset,
systems which have relatively large bass speakers. The said emitter being directed toward the opening of the
boombox derives its name from the annoying side affect of resonant cavily for transmitting first and second ullra-
a booming and repeated “thump” of Ше bass speakers sonic signals along а common axis into the resonant
driving large volumes of air. Полуемег, the term is also 50 cavily without indirect reflection [rom other sources;
sometimes used to refer to a car or other vehicle with even modulating means coupled to the ultrasonie frequency
larger bass speakers. Because the speakers are integrally emitter for eencrating the second ultrasonic frequency
allached to Ше vehicle, the frame or any loudspeaker enclo- having a difference in value relative to the first ullra-
sure in general, the enclosure itself becomes a radiating sonic frequency which is equal to the at least one
element. Consequently, persons outside the vehicle will be ss audible frequency;
hit with wave upon wave of dull thumping sounds, а means for concurrently operating the ultrasonic frequency
nuisance at best. emitter and the modulating means to generate the first
The present invention can thus advantageously eliminate and second ultrasonic signals, and
the coupling of the enclosure to the direct radiating element means [or directing the first and second ultrasonic signals
by generating the new compression wave in midair. The 60 into the resonant cavity.
listener inside can still enjoy Ше experience of loud bass 2. The system as defined in claim 1 wherein the resonant
frequencies within the confines of the vehicle. However, the cavity has a configuration corresponding to a human car
lower lrequeucies will noi be directly coupled to the vehicle canal.
frame because the radiating element is now a point in air. 3. A method Гог indirectly generating and enhancing аі
Consequently, undesirable bass broadcasting into the envi- 65 least one audible frequency from within a resonant cavity
ronment beyond the immediate vicinity of the listener is using at least two ultrasonic signals of different frequency
significantly reduced. the method comprising the steps o£
194 / 340
206 / 570
207 / 569
5,889,870
17
1) transmitting a first ultrasonic signal into the resonant
cavily using an emiller contained within one of a stereo
headphone, a hearing aid, or an audio headset;
2) concurrenily transmitting a second ultrasonic signal
from said emitter into the resonant cavity along а
common axis with the first ultrasonic signal wherein
the second ultrasonic signal has a frequency which
differs [rom the first ultrasonic signal by a value gen-
erally equal to the at least one audible Педиепсу, and
tA
18
second ultrasonic wave train has a base frequency equal
то the base frequency of the first ultrasonic wave train
and is projected along a common axis lor both the first
ultrasonic wave train and second ultrasonic wave train,
which common axis is the only transmission path
between said transducer means and a reflective surface
of an object which is distant from the listener;
varying the base frequency of the second ultrasonic wave
train through a frequency range corresponding to a sum
wherein the resonant cavity amplifies the interference 12 a .
berween the first and the second ultrasonic signals; of the base frequency and the new audible sound wave
3) whereby at least onc audible frequency arises from the тп apd i .
interference of the first and the second ultrasonic sig- 4) reflecting the first and second ulirasonic wave trains
nals within the resonant cavilv. from said a rellective surface to generale omni-
4. A method for indircetly generating, omni-dircetional 15 directional dispersion of audible sound leaving a
sound as part of an audio sound system for entertainment usc virtual, localized sound source at the reflective surface.
by a listener and having a remote virtual source distant from 5. The method as defined in claim 4 wherein the method
the listener, said omni-directional sound comprising at least comprises the additional step of generating both the (1) first
one new sonic or subsonic wave train which isa difference | ultrasonic frequency aud (ii) the second ultrasonic frequency
of at least two interacting ultrasonic wave trains having ^" from a single ultrasonic generating means, thereby elimi-
frequencies of different value, the method comprising the nating frequency drift between the first and the second
steps of: ultrasonic frequencies.
1) emitting a first ultrasonic wave train including a base 6. A method as defined in claim 4, further comprising the
Irequency into a region of air from a transducer means; 25 Мер of controlling Ше movement and orientation of the
2) concurrently emitting a second ultrasonic wave train wave train with a computer driver.
from said transducer means into the region to thercby
interact with the first ultrasonic wave train wherein the ж ж + * ¥
195 / 340
207 / 570
PDF SECTION:
UNITED STATES PATENTS.
E
209 / 569
United States Patent пя
Monroe
[54]
[75]
[73]
[ * ]
[21]
[22]
[51]
[52]
[58]
156)
METHOD OF AND APPARATUS FOR
INDUCING DESIRED STATES ОҒ.
CONSCIOUSNESS
Robert A. Monroe, Nelson County,
Va.
Interstate Industries Inc., Faber, Va.
The portion of the term of this patent
subsequent to May 25, 2010 has been
disclaimed.
: 664,176
Mar. 1, 1991
Int, CES anis A61M 21/00
US: a оха 600/28; 128/732.
Field of Search .................................... 600/26-28;
128/731-732
Inventor:
Assignee:
Notice:
References Cited
U.S. PATENT DOCUMENTS
2,466,054 4/1949 Siebel.
3,160,159 12/1964 Hoody et al. .
3,576,185 4/1971 Schulz её al. .
3,712,292 1/1973 Zentmeyer, Jr. .
3,753,433 8/1973 Bakerich et al. .
3,826,243 7/1974 Anderson.
3,837,331 9/1974 Ross.
3,884,218 5/1975 Monroe.
4,034,741 7/1977 Adamsetal.
4,141,344 2/1979 Barbara .
ПЛАНА A A
US005356368A
[ii] Patent Number: 5,356,368
[43 Date of Patent: * Oct. 18, 1994
4,227,516 10/1980 Meland et al. .
4,335,710 6/1982 Williamson .
4,573,449 3/1986 Warnke .
4,834,701 5/1989 Masaki .
4,883,067 11/1989 Knispel et al. ........................ 600/28
5,036,858 8/1991 Carter etal. .
5,101,831 4/1992 Koyama et al ..................... 600/26
Primary Examiner—Lee S. Cohen
Assistant Examiner—3. P. Lacyk
Attorney, Agent, or Firm—Sughrue, Mion, Zinn,
Macpeak & Seas
[57] ABSTRACT
Improved methods and apparatus for entraining human
brain patterns, employing frequency following response
(FFR) techniques, facilitate attainment of desired states
of consciousness. In one embodiment; a plurality of
electroencephalogram (EEG) waveforms,. characteris-
tic of a given state of consciousness, are combined to
yield an EEG waveform to which subjects may be
susceptible more readily. In another embodiment, sleep
patterns are reproduced based on observed brain pat-
terns during portions of a sleep cycle; entrainment prin-
ciples are applied to induce sleep. In yet another em-
bodiment, entrainment principles are applied in the
work environment, to induce and maintain a desired
level of consciousness. A portable device also is de-
scribed.
28 Claims, 21 Drawing Sheets
LEFT HEMISPHERE
BRAIN WAVES
ЕРІ
0 j
10 15
LEFT FREQUENCIES - Hz
197 / 340
209 / 570
0,5. Patent Oct. 18, 1994 Sheet 1 of 21 5,356,368
LEFT HEMISPHERE | RIGHT HEMISPHERE
BRAIN WAVES BRAIN WAVES
ЕРІ TM FP?
0 5 10 15 0 5 10 15
LEFT FREQUENCIES - На RIGHT FREQUENCIES - Hz
FIG. 1А FIG. [В
FOREHEAD
| 2
Е d z
5
И И
ЦЕ; d
E
LEFT RIGHT
eo ==
а... златен
7
л d Y
MAXIMUM
AMPLITUDE
TOPOGRAPHIC BRAIN MAP OF
NEOCORTEX 4-8 Hz
210 / 569 198 / 340
210 / 570
U.S. Patent
LEFT HEMISPHERE
BRAIN WAVES
AAMAMM,
5 0 3 10 5
0 5 D
LEFT FREQUENCIES - Hz
FIG. 1D
LEFT
MAXIMUM
AMPLITUDE
211/569
Oct. 18, 1994
Sheet 2 of 21 5,356,368
RIGHT HEMISPHERE
BRAIN WAVES
MIA,
RIGHT FREQUENCIES - He
FIG. ТЕ
FOREHEAD
RIGHT
ы с
0. Ж
(0m al
БЫН а ИШ Ш
JA" LLLLELI
LLLI?
uar
12
"ERN
« ті
ААА IT.
TOPOGRAPHIC BRAIN MAP OF
NEOCORTEX 4-8 Hz
199 / 340
U.S. Patent Oct, 18, 1994 Sheet 3 of 21 5,356,368
FIG. 2
DISPLAY +~ 30
212 / 569 200 / 340 212 / 570
Sheet 4 of 21 5,356,368
Oct. 18, 1994
17,8. Patent
AlddA$ 83404
T ковена
1531
yi Wi |
A ЕН 1198
ч 4, %1 %! I
MOT 1198 di cH cy
DG M ы
Y Yi 3192 326€
P bY cu
Lr. «2 7 ;
Ы 100 NI < аю
11989;
076207 10098!
. A+ 100981 >
q31Y 1533 60 7 Wo аи ШТ қ
ТЕ
4
10068
л01+ 20
031719380
Yol
yol 30;
018 63 By .
1000 <b
Ж | с 914
“7
213 / 570
201 / 340
213 / 569
Sheet 5 of 21 5,356,368
Oct. 18, 1994
U.S. Patent
ТД <р adr:
ТІПТІ KONIHI +T 9
71 67
by n
X001
e
££ T
89
OV WOU cf
i
SE 00 НОН |
98 10 WO
00 HOU б
ТЕКТЕГІ!
V WOW] [10 ROY ог
CA RON tl EU
1 Uu 0 0
cll ROY b ( TRI
£i] HOY SI Qt SO MON
btg МОН 9) ¿b 90 ИОН
Std ROH Л
y bt
3% 00 HO
p ut
“| нома
7
МОН |
T нов Ipujaju:
20} №0] BLE
33 jousayxe
10; бъ 911
(1u09)g 7913
214 / 570
202 / 340
214 / 569
Sheet 6 of 21 5,356,368
Oct. 18, 1994
U.S. Patent
114510
£ 90 Hid
60 Nd
9 0 HVd |
ПРИМ |
1931 81 20 В |
Live ПЕШТЕ;
[ДИП
11
101D31DUI шоу 204091рш Wd
i| 00 iyd
0% 10 УУЗ
00 Wd
8 fd НУ
G %0 YYd
60 WVd
90 ud
è 10 8У4
v8 00 ЧУ
9 60 УМ
8 O10 УУ
18 110 BVd
82 210 Hd
1L £M] Bd
ІШ 14510”
(61794670 |
Еоведван
81
SL 84510
ç 1480
#062509
uz
06с450Н
01
#064509
62
[9 00 HVd |
84510 21 £t 10 Ну9
1410 Gl М с; Wd
"34510 9 l| EC NWd |
04510 S Р bi HVd
724010 91 ПИЕТЕ
84510 61 91 90 ЧУЧ
ДЕЦА
b 913 ш
215 / 570
203 / 340
215 / 569
Sheet 7 of 21 5,356,368
Oct. 18, 1994
U.S. Patent
lfldNI HOLIAS
113110 QUAY — T Азов
m|] 8800} рио asiou
2094 O] мор а
“Ч01404940 {Ou ou
WOOV W090 | 203 убщ 91)
INO HOT м
ПАЙТ.
„= ММУ
27274 09944 ^3 usa
егі 37 ONE uf =н
A lu т "o жи [TITIO ll emm
ШТІ ин
š | И
кы d
| s| HHHH
gni | Hn | lN
6913
216 / 570
204 / 340
216 / 569
Sheet 8 of 21 5,356,368
Oct. 18, 1994
U.S. Patent
£f
$34345
18918
18
100)
029
(1009) G 913
217 /570
205 / 340
217 / 569
U.S. Patent
асхалавчаа Рах
тиым ви?
Осі. 18, 1994
Sheet 9 of 21
5,356,368
HP !GFF
218/50
U.S. Patent Oct. 18, 1994 Sheet 10 of 21 5,356,368
taxed 1
ау
HBR Н
амы TAMNG ла.
219 / 569 219 / 570
U.S. Patent
Oct. 18, 1994
ТаКТ: 148 END:185
Sheet 11 of 21
SR:64
„ав
— MR
5,356,368
220/570
U.S. Patent Oct. 18, 1994 Sheet 12 of 21 5,356,368
4.083
—
221/ 569 221 / 570
U.S. Patent Oct. 18, 1994 Sheet 13 of 21 5,356,368
HP
SIK
ста
АР
ANY TERS START:1 EHD:58 A 5
222 / 569 222 /570
U.S. Patent Oct. 18, 1994 Sheet 14 of 21 5,356,368
SOUND
LEVEL
DETECTOR
L.G.H. SPEAKER
SOUND
CENERATOR
R.C.H. SPEAKER SELECTOR
220 200 290
223 / 569 211 / 340 223 / 570
224 / 569
U.S. Patent Oct. 18, 1994 Sheet 15 of 21
FIG. 8A
300 SIGNAL
GENERATOR
SPEAKERS/ HEADPHONES
212 / 340
5,356,368
224 /570
Sheet 16 of 21 5,356,368
Oct. 18, 1994
U.S. Patent
nee | ТАТТУ A^
по
9
301 АЗ k
Hby
1002242
#7
2
b
£l
HI
bi А
PT
| H
ObObOHbL
| 27
100:
£j
v 89 913
01
H
ООН
£2
25-87-67 91-22 : 90^
91-VZ 8-61 8-27 :QN9
225 / 570
213 / 340
225 / 569
U.S. Patent Oct. 18, 1994 Sheet 17 of 21 5,356,368
FIG. SA
"Baseline" Brain Waves
ЕЕ POWER (Huv pp)
30 0-4Hz- 18.8%
4-8Hz- 9.2%
% 8-i2Hz- 16.2%
10 12-30Hz= 49.2%
0
-|0
-20
-30
214 / 340 | 226 / 570
226 / 569
U.S. Patent
MOOD-MINDER Stimulus Frequencies
POWER |
(uVpp)
10
8
6
4
2
0
<>
MOOD-MINDER Stimulus Wave
ANPLITUDE
(uV)
30
20
М000-МІНОЕК Response Broin Wave
AMPLITUDE
(uV)
30
20
227 / 569
5,356,368
POWER(%uV pp)
16Н7= 41.6%
0182- 23.2%
Awake and Alert
POWER(%uV" рр)
l6Hz- 47.6%
21Hz= 23.2%
Awake and Alert
РОЖЕН Жуугрр)
i6Hz- 46.5%
21Н2= 23.7%
Awake and Alert
227 [570
U.S. Patent
КОС MINDER Stimulus Frequencies
(uv2pp)
10
8
6
4
2
0
0
MOOD-MINDER Stimulus Wave
AMPLITUDE
(чү)
30
20
M00D-MINDER R i
AMPLITUDE esponse Brain Wave
(uV)
30
20
228 / 569
Sheet 19 of 21
5,356,368
POWER(%uVpp)
21Hz- 13.3%
8Hz- 22.1%
4Н2= 35.5%
Concentration
POWER(%uV pp)
| 21Н2- 13.3%
BHz= 22.1%
4Н2= 35,5%
Concentration
POWER(%uV° рр)
2182- 14.3%
8Hz- 21.5%
4Нт- 31.5%
Concentration
228 / 570
U.S. Patent
MOOD-MINDER Stimulus Frequencies
POWER
(uV pp)
19
8
6
>>
MOOD-MINDER Stimulus Wave
AMPLITUDE `
(uV)
30
20
MOOD-MINDER Res Brain W
res: ponse Brain Wave
(чу)
30
20
229 / 569
5,356,368
POWER(%uYĉpp}
IGHz= 11.5%
THz- 28.4%
4Hz- 30.2%
Attention
POWER(%u¥" pp)
IGHz= 11.5%
THz= 28.4%
4H2- 30.2%
Attention
POWER(% UV" рр)
16Н2= 8.2%
THz= 28.7%
4Н2= 32.6%
Attention
229 / 570
U.S. Patent Oct. 18, 1994 Sheet 21 of 21 5,356,368
NOOD-MINDER. Stimulus Frequencies |
(u¥2pp) POWER ("su V^ pp)
19 GHz: 9.5%
4Hz= 15.4%
ы 1.581= 19.6%
6 ` Relaxation
4
2
0
0 20 40 60
Hz
MOOD-MINDER Stimulus Wave Е | б. 91
AMPLITUDE |
шыл POWER(%uY pp)
6Hz- 9.5%
e 4 Нг- 15.4%
10 | 1.5Hz= 19.6%
0 Relaxation
-10
-20
-30
Aap ABER Response Brain Wave FIG. 3 M
(чү) POWER(%uV pp)
ы GHz- 7.9%
20 &Hz- 16.856
10 1.5H2=20.0 %
0 Relaxation
-10
-20
-30-
230 / 569 218 / 340
230 / 570
231 / 569
5,356,368
1
METHOD OF AND APPARATUS FOR INDUCING
DESIRED STATES OF CONSCIOUSNESS
CROSS-REFERENCE TO RELATED
APPLICATION
The present application is related to copending appli-
cation No. 07/514,460, filed Apr. 16, 1990 now U.S.
Pat. No. 5,213,562.
BACKGROUND OF THE INVENTION
L. Field of the Invention
Те present invention relates to an improved method
of inducing desired states of consciousness, including
different levels of sleep, in human beings, using a tech-
nique known as frequency following response (FFR),
developed by the present inventor. The invention also
relates to apparatus for performing the method. A num-
ber of areas of applicability of the invention are de-
Scribed, in accordance with different preferred embodi-
ments.
2. Description of the Background Art
In a prior patent, U.S. Pat. No. 3,884,218, the present
inventor described a method of inducing different levels
of sleep, using the FFR technique, in which brain waves
could be made to follow superimposed frequency pat-
terns. These frequency patterns were provided as sine
waves, at frequencies known to correspond to different
levels of sleep, such as alpha (exhibiting brain wave
activity in the range of 8-12 Hz), theta (6-8 Hz), and
5
10
25
30
delta (1-4 Hz). EEGs exhibiting frequencies between 12 .
and 30 Hz (known as a beta range) are characteristic of
awake individuals, though beta activity at even higher
frequencies has been observed in different types of men-
tal activities. Gamma activity has been characterized as
all activity above 30 Hz; until recently, it has not been
possible to monitor brain activity in the gamma range.
(It should be noted that the boundaries between gamma
and beta, beta and alpha, alpha and theta, and theta and .
delta are somewhat arbitrary; the foregoing delineations
are intended to be exemplary and not limiting.)
The present inventor discovered that the human
brain could be entrained to output brain wave patterns
these different frequencies. While frequencies corre-
sponding to these different levels of sleep are not audi-
ble, by superimposing those frequencies on some type of
sound, such as music, it was determined to be possible to
induce desired levels of sleep. Тһе individual listening
to the music would “hear” the low frequencies, with the
desired effect on brain activity.
An improvement on the inventor's patented tech-
nique, to induce varied states of alertness, is the subject
of copending Application No. 07/514,460, the contents
of which are hereby incorporated herein by reference.
This copending application describes a general FFR
technique using what is known as a binaural beat phe-
nomenon, details of which are provided in that applica-
tion. Briefly, a binaural beat is produced by sending
signals at different frequencies (some Hz apart, depend-
ing on the desired effect) to an individual’s left and right
ears. The difference between the frequencies defines the
frequency of the binaural beat. Using this technique, the
desired frequency can be introduced into the individu-
al’s brain activity, inducing the desired state of con-
sciousness.
The induction of FFR in the human brain in this
manner results in the synchronization of activity in the
hemispheres of the brain. FIG. 1A shows brain activity
35
40
45
50
60
65
2
without FFR, and FIG. 1B shows brain activity with
ЕЕК. The inventor has coined the term HEMI-SYNC
(for Hemisphere Synchronization) to describe this phe-
nomenon.
The copending application describes a technique
wherein, in one form, sine waves having a frequency
corresponding to a consciousness state are superim-
posed on two different carrier frequencies to form two
different signals to set up the binaural beat. In another
form, an actual brain pattern, based on an electroen-
cephalogram (EEG) waveform indicative of that con-
sciousness state is superimposed on the different carrier
frequencies to form two different signals. In use, each
signal is provided to one ear of a subject. The difference
in carrier frequencies sets up the binaural beat.
Another, more limited application of the binaural
beat phenomenon is found in U.S. Pat. No. 4,834,701. In
contrast to the narrow range of frequencies discussed in
that patent, in the above-mentioned copending applica-
tion, the applicability of the binaural beat phenomenon
is investigated over a much wider range of frequencies,
spanning the spectrum of brain activity.
Through additional investigation involving mapping
of brain activities of different individuals, the present
inventor has discovered some significance to the fact
that, while brain waves at certain frequencies are char-
acteristic of different levels of sleep, brain patterns of
different individuals still vary. The inventor has investi-
gated possible enhancements to the FFR effect by mak-
ing it more generic among individuals, yet still more
specific to brain activity than a simple sine wave, or an
EEG of a particular individual.
Another area of investigation being performed by the
present inventor relates to human sleep patterns. Based
on current knowledge of human sleep patterns, it ap-
pears that sleep is composed of a series of 90-minute
cycles. As stated earlier, the beta stage is one of alert-
ness. The first sleep state is alpha, or mental and physi-
cal relaxation. The second is theta, or light sleep. Next
is delta, or deep sleep. The inventor has investigated the
possibility of providing FFR waveforms in cyclic pat-
terns, replicating these human sleep patterns, to facili-
tate sleep. Another possibility is to take advantage of
the cyclic nature of sleep patterns to provide a more
gentle wake-up for a sleeper.
In considering the need for alertness during activities
such as work, the inventor also considered how it might
be possible to introduce FFR waveforms into ambient
noise in one's surroundings to facilitate maintenance of
desired states of consciousness. Particularly in environ-
ments such as factories, or in offices where office equip-
ment puts out consistent types of noise, it would be
desirable to be able to introduce a binaural beat into that
noise at different frequencies, to enhance the degree of
alertness of factory or office workers as desired.
SUMMARY OF THE INVENTION
In view of the foregoing, according to one aspect of
the invention, EEGs for a number of individuals in
different states of consciousness are sampled, and EEG
waveforms for the group of individuals, corresponding
to each identifiable state of consciousness, are com-
bined. A binaural beat then is generated using the com-
bined EEGs.
According to this aspect of the invention, it has been
determined that using groups of EEG waveforms from
different individuals and combining them to obtain a
219 / 340
231/570
232 / 569
5,356,368
3
representative waveform yields a waveform that a per-
son's brain is more likely to replicate than an individual
EEG waveform, or a sine wave representation of the
EEG waveform. The combination may be simple aver-
aging, though other combination techniques, such as
weighted averaging, for combining different. numbers
of EEG. waveforms as desired, are contemplated. Now
that the inventor has discovered that combinations of
EEG waveforms provide a particularly effective en-
trainment environment, it will be seen that various ways
of combining these waveforms may yield greater or
lesser effects.
In accordance with another aspect of the invention, a
method for replicating cyclic sleep patterns for a de-
sired sleep period is provided. In a preferred embodi-
ment according to this aspect of the invention, a subject
is led from beta, to alpha, to theta, to delta, then back to
theta, then alpha, then a rapid-eye movement (REM) or
light dreaming sleep, in a sequence of 90-minute cycles,
during a sleep period of desired duration. After the
expiration of the period, the subject may wake up vol-
untarily. Alternatively, the invention can provide а
gentle external stimulus to lead the subject to a beta
state.
With respect to this aspect of the invention, an appa-
ratus is provided which automatically leads an individ-
ual through these cyclic sleep patterns, and enables the
individual to set a desired sleep period. This device
preferably takes advantage of the techniques to be de-
scribed relative to the first-mentioned aspect of the
invention, but is not so limited. The inventive contribu-
tions of this second aspect of the invention are consid-
егей to Пе in the combination of hardware itself which
generates the desired sequence of binaural beats, as
opposed to the particular software which determines
the nature of those binaural beats. In one form, the
invention is constituted by an alarm clock which pro-
vides a fade-in theta-alpha signal followed by a strong
beta-gamma signal shortly before a desired wake-up
time.
According to yet another embodiment of the inven-
tion, selectable mind-affecting sound patterns are pro-
vided to supplement constant ambient noise in any envi-
ronment. When the noise is not present, the patterns are
not provided. The patterns vary in amplitude in accor-
dance with changes in the environmental noise.
In accordance with still another embodiment of the
invention, a portable system is provided to enable the
wearer to introduce binaural beat signals of frequencies
that are selectable in accordance with a desired level of
awareness. Depending on the level of sophistication of
the device, the binaural beat may be generated using the
combined EEG waveforms of the first aspect of the
invention, but this last aspect of the invention is not so
limited.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other aspects of the invention will
be understood by those of working skill in this techno-
logical field by reference to the following detailed de-
scription of the preferred embodiments of the invention,
read in conjunction with the accompanying drawings,
wherein:
FIGS. 1A-1C and 1D-1F taken from the above-men-
tioned copending application, show one example of the
results which can be achieved using the inventive tech-
niques;
10
20
25
40
45
50
55
60
65
4
FIG. 2 is a block diagram of the hardware according
to a second embodiment of the invention, and FIGS.
3-5 are more detailed schematics therefor;
FIGS. 6A-6J are drawings, similar to FIGS. 1A and
1B, but showing brain activity during various stages of
a sleep cycle, using a technique in accordance with the
second embodiment of the invention;
FIG. 7 is a block diagram of hardware in accordance
with a third embodiment of the invention;
FIG. 8A is a block diagram of hardware in accor- .
dance with a fourth embodiment of the invention, and
FIG. 8B a schematic of that hardware; and
FIGS. 9A-9M are graphs of different possible effects
of the. embodiment of FIGS. 8А and 8B, showing а
baseline brain pattern, selected stimulus frequencies and
corresponding stimulus waves, and associated response
waves.
DETAILED DESCRIPTION OF THE
PREFERRED EMBODIMENTS
The method according to a first preferred embodi-
ment of the invention, which has been developed
through extensive experimentation, derives from the
empiricaliy-observed phenomenon that brain patterns
of human subjects are entrained more readily to brain
patterns which more closely match their own. In prior
implementations of the FFR technique, such as in the
inventor’s prior patent, in which sine waves having
frequencies corresponding to desired levels of sleep
were superimposed upon a given frequency, entrain-
ment did occur. Use of the binaural beat phenomenon
yielded better results, through synchronization of the
hemispheres of the brain.
However, simple repetitive frequencies, or even com-
binations of such frequencies within different ranges, do
not represent brain patterns per se, but rather provide
entrainment environments for the brain to follow. It has
been determined that, the more closely the entrainment
environment parallels normal brain function at different
levels of consciousness, the more effective the entrain-
ment effect. This phenomenon is what led to the im-
provement disclosed in the above-mentioned copending
application.
As a further improvement on that technique, as men-
tioned above, the present inventor investigated the pos-
sibility of creating more generic models of brain func-
tion at different levels of consciousness. As a result of
that investigation, it was determined that combinations
of EEG waveforms from different individuals function-
ing.at the same identifiable level of consciousness (e.g.
alpha sleep, theta sleep, or deita sleep) provided a supe-
rior entrainment environment. In the inventive method
according to this aspect of the invention, the brain pat-
terns of 40 to 50 individuals were combined to yield the
entrainment environment.
One area of applicability of the techniques of the
present invention is in the area of sleep therapy. Many
individuals suffer from sleep disorders to varying de-
grees. It is possible to provide a suitable entrainment
environment, based on known sleep cycles prevalent in
humans, to help individuals to regulate their sleep pat-
terns, and thus help to solve their sleep disorders. One
embodiment of the invention, shown in FIG. 2 and also
іп FIGS. 3-5, implements the inventive techniques in
what the inventor calls a Sleep Processor to aid in the
regulation of human sleep cycles.
In FIG. 2, a read-only memory (ROM) 10 stores
frequency sequences corresponding to different parts of
220 / 340
232 / 570
33 / 569
5,356,368
5
а human sleep cycle. The stored frequency sequences
may be in accordance with a predetermined algorithm,
or alternatively may provide a less complex entrain-
ment environment, such as simple averaging. A digital
signal processor (DSP) 20 selects different ones of these
sequences based om the current time and the time to
which an alarm is set. The time is displayed on display
30, and is set using time set 40. The alarm 15 set to а
desired wake-up time using alarm set 50.
During operation, the DSP 20 accesses the ROM 10
and provides an output to a pulse code modulator unit
(PCM) 60 accordingly. The PCM 60 provides an output
to each of left and right channel speakers 70, 80 which
are provided in close proximity to the ears of a human
subject. Using headphones enhances the effect.
Some additional detail of operation of the DSP 20 in
one aspect of this embodiment now will be provided. A
serial port in the DSP 20 generates an interrupt at a 50
KHz rate. An interrupt handler іп the DSP 20 computes
the various sounds, in one form, by generating sine
waves using a pair of integrators:
cosine = соѕіпе + frequency X sine
sine=sine—frequency X cosine
The Sleep Processors needs ten frequencies, five for
each channel, and all of these frequencies are generated
at the same time. The results are multiplied by ten en-
velopes, most of which are zero at any moment.
Noise is generated by a well-known 16-bit shift-regis-
ter algorithm. This algorithm generates a noise signal
that repeats every 65535 samples, or about every five
seconds. The noise is filtered to sound more like pink or
red noise, and less like white noise, and is written into а
delay line in RAM. For each channel, the filtered noise
is averaged with an earlier sample from the delay line,
thus imparting a comb filter response to it.
An additional low-frequency sine/cosine pair is gen-
erated, to sweep the comb filter delay. 32-bit arithmetic
is used here. The approximate sweep rate is about 1/8
Hz. The low-frequency sine wave is used directly to
sweep the delay on one channel. The delay on the other
channel is controlled by some mix of the sine and cosine
waves. By choosing these and other coefficients prop-
erly, any phase and amplitude relationship between the
left and right sweep can be obtained. The comb filtered
noise for each channel is multiplied by a noise envelope
value.
The device is operated as follows. A desired wake-up
time is set, much like an alarm clock, and the desired
volume is selected. A start/stop button then is pressed
to start the cycles for the selected sleep period.
Throughout the sleep period, the device repeats a 90
minute cycle of sound that leads the subject through
alpha, theta, delta, and back to dreaming sleep. Five
minutes before the scheduled wake-up time, a beta sig-
nal is introduced to bring the subject back to complete
physical wakefulness. When the subject wakes up, he/-
She hits the start/stop button again to stop the sound
sequence.
The sounds produced by the DSP 20 include binaural
beat carrier sound patterns utilizing both amplitude and
frequency modulation, masking pink sound (a known
type of sound described in the copending application),
and, optionally, occasional single-word voiced affirma-
tions. The binaural beat audio signals may be in the form
of appropriate sine waves, or alternatively may be repli-
cas of actual EEG brain waveforms. Іп the latter case,
either the just-described combined EEG waveforms or
asingle EEG waveform (as described in the copending
15
20
25
30
35
45
50
55
60
65
6
application) жау be used. The entire pattern of sound
and control is generated algorithmically.
One aspect of the effectiveness of the device of FIGS.
2-5 is the spacing of sound carriers at related frequen-
cies so as to engender binaural beat signals not only
from channel to channel, but also monauraily, in each
audio channel. In this preferred embodiment, three
binaural beat frequency signals are created between
audio carrier channels, and two amplitude beats per
channel also are created, yielding a total of seven beat
signals. The inventor has coined the term Septon for
this set of beat signals. One example of a septon is as
follows:
Left Channel Right Channel
200 Hz carrier (4 Hz binaural beat) 204 Hz carrier
(4 Hz monaural (4 Hz monaural beat)
beat)
204 Hz carrier (4 Hz binaural beat) 208 Hz carrier
(4 Hz monaural) (4 Hz monaural beat)
beat)
208 Hz carrier (4 Hz binaural beat) 212 Hz carrier
А standard program according to this preferred em-
bodiment would employ the following sound sequence:
0-5 minutes:
Signal Group A (comprised of replicated EEG wave-
forms having dominant values in the alpha range)
Signal Group В (15 dB below Group А, generated
simultaneously with the sounds of Group А, and com-
prised of replicated EEG waveforms having dominant
values in the theta range)
Phased Pink Sound (six seconds, peak-to-peak, on both
left and right channels, 20 dB below Group À)
Voice Inserts (repeated at 40 second intervals, 10 dB
below Group A, simultaneously with the other sounds,
and comprising short sequences of phrases like “relax”
“let go", and *sleep")
5-20 minutes:
Signal Group В
Signal Group C (20 dB below Group B, generated si-
multaneously with Group B, and comprised of repli-
cated EEG waveforms having dominant values in the
delta range)
Phased Pink Sound (15 dB below Group B, having a
duration as in the first interval)
Voice Inserts (10 dB below Group B, comprised as
above)
20-40 minutes:
Signal Group C
Signal Group D (10 dB below Group C, generated
simultaneously with Group C, and comprised of repli-
cated EEG waveforms having dominant values in the
lower delta range)
Phased Pink Sound (10 dB below Group C, having a
duration as in the fixst interval)
Voice Inserts (20 dB below Group C, comprised as
above) 40-65 minutes:
Signal Group D
Phased Pink Sound (10 dB below Group D, having a
duration as in the first interval)
Voice Inserts (20 dB below Group D, comprised as
above) 65-80 minutes:
Signal Group C
Signal. Group D (10 dB below Group C, generated
simultaneously with Group C)
Phased Pink Sound (15 dB below Group C, having a
duration as in the first interval)
221 / 340
233 / 570
234 / 569
5,356,368
NO voice inserts
80-90 minutes:
Signal Group B
Signal Group C (10 dB below B, generated simulta-
neously with Group B)
Phased Pink Sound (15 dB below Group B, having a
duration as in the first interval)
NO voice inserts
The foregoing sequence is repeated through the sleep
period until the wakeup sequence, approximately five
minutes before the set wake-up time:
Signal Group AA. (a wakeup sequence, comprising
replicated EEG waveforms having dominant values in
the beta range, or alternatively a 400 Hz/416 Hz enve-
lope yielding frequencies in the beta range)
Voice inserts (10 dB below Group AA, comprised of
Short phrases such as “waking up”, “refreshed”,
"bright", and repeated at intervals)
One variation of the foregoing embodiment is an
alarm clock which, instead of sounding a loud alarm or
other jarring noise at wake-up time, starts a gentle se-
quence of signals some minutes before, to bring an indi-
vidual up gently through the various levels of sleep to
full wakefulness. A fade-in theta-alpha signal may be
provided, followed by a stronger beta-gamma signal.
FIGS. 6A to 6J show the effects of the just-described
"sleep processor" embodiment. Column 1 shows distri-
bution of delta frequencies; column 2 shows distribution
of theta frequencies; and column 3 shows distribution of
alpha frequencies. The top row of graphs is the actual.
pattern observed in the individual, and the bottom row
is the baseline pattern.
FIG. 6A corresponds to a normal waking state. Dom-
inant alpha activity is shown in the occipital area of the
brain. In FIG. 6B, pink noise has been applied, without
any beat frequencies. A narrower focus of waking state
is shown.
In FIG. 6C, a signal sequence corresponding to Sig-
nal Group A has been applied. Some gain in theta fre-
quencies are seen, with rapid diffusion of alpha frequen-
cies and movement toward the vertex of the head. In
FIG. 6D, a signal sequence corresponding to Signal
Group B has been applied. There is further diffusion of
alpha frequencies, with some movement of delta and
theta activity toward the pre-frontal cortex of the brain.
In FIG. 6E, a signal sequence corresponding to Sig-
nal Group C has been applied. There is rapid diffusion
of alpha frequencies, and increased power of theta and
delta frequencies. In FIG. 6F, a signal sequence corre-
sponding to Signal Group D has been applied. Alpha
frequencies are diffused further toward the pre-frontal
cortex, and there is a marked increase in theta and delta:
frequencies.
FIG. 6G, continuing application of Signal Group D
frequencies, shows a marked increase in delta activity in
the pre-frontal cortex, with a steady decrease in alpha
activity at the vertex. In FIG. 6H, another binaural beat
stimulation has been applied, and characteristics of
stage 3 and 4 sleep may be observed. In FIG. 6I, further
evidence of the further binaural beat stimulation is ob-
served. Delta is the dominant frequency here. Alpha
and theta activity has moved to the prefrontal cortex.
Finally, FIG. 6) shows early awakening activity, with a
diffusion of delta activity.
FIG. 7 is a block diagram of hardware in accordance
with another embodiment of the invention, having ap-
plication to the work environment, or anywhere a con-
Stant source of noise is present, to allow workers, for
15
20
25
30
40
45
55
60
65
8
example, to maintain a desired state of awareness. The
device may contain suitable digital signal processor
circuitry, as in the preceding embodiment. One differ-
ence is that the operation of the.device is keyed to the
presence of ambient noise, not to a given time duration
or selected sleep period.
The device of FIG. 7 includes a sound generator 200
which, as just mentioned, may comprise a digital signal
processor. The generator 200 outputs sound patterns via
one or more speakers (left and right channel speakers
210, 220 are shown). A sound level detector 230 detects
the level of ambient noise in the room, and provides a
signal to the sound generator 200), or activates a cut-off
switch (not shown), to discontinue output of the sound
generator 200 when the ambient noise level drops
below a predetermined level.
The sound level detector also preferably provides a
signal to the sound generator 200 to boost the sound
pattern output when the ambient noise level increases,
so that the effect of the provision of the sound pattern is
commensurate with the noise level in the room. Alter-
natively, the user may simply adjust the volume manu-
ally, using one or more knobs (not shown) on the sound
generator 200.
А timer 240 may be provided to control the duration
of provision of the selected sound pattern, or even to
change the sound pattern at different times of day by
controlling a selector 250 which the user accesses to
select a particular sound pattern to be output. The user
may select a given sound pattern in the morning, and
the timer 240 may change that pattern automatically,
based on a need at different times of day for sound
patterns providing different states of alertness.
The sound pattern produced by the device of FIG. 7
varies automatically in amplitude in accordance with
changes in the ambient noise, and is discontinued when
the noise stops. As a result, the sound remains unobtru-
sive. Depending on the setting, the produced sound
pattern can enhance wakefulness, promote relaxation
(as, for example, in rest areas in the workplace), reduce
anxiety and stress, or focus attention, among other char-
acteristics.
The basic system of FIG. 7 produces and inserts four
different sound patterns which are selected manually so
as to merge the output into the constant ambient noise.
More sound patterns are possible, depending on the
desired overall capabilities of the system. Various modi-
fications are possible. For example, а programmable
version may be provided, which changes the form of
the sound patterns throughout a work day or night, in
accordance with the responses desired.
Selectability of patterns may be accomplished differ-
ently in a model intended for use in conjunction with a
computer system. The computer operator can input a
selection, and may vary that selection as desired
throughout the work day.
FIG. 8A is a diagram of a portable embodiment of the
invention, for use in providing a desired level of con-
sciousness on an individualized basis. A signal generator
300 preferably includes a digital signal processor 310
and a ROM 320 for storing predetermined signals or
sequences of signals which correspond to various de-
sired states of awareness. The signal generator 300 may
be a simple tone generator or pair of tone generators
which provide outputs to speakers or headphones 330
(such as button-sized headphones) to set up a binaural
beat. Output of pink sound or phased pink sound by the
generator 300 is desirable to facilitate defocusing of the .
222 / 340
234 / 57
235 / 569
5,356,368
9
listener and consequent ability to concentrate on the
sounds being produced. A selector 340 enables a user to
instruct the signal generator 300 to output signals corre-
sponding to the level of consciousness (e.g. focused
concentration, relaxation, alertness) that a user desires.
. FIG. 8B shows a schematic of this embodiment,
which the inventor calls a “Mood Minder”. This em-
bodiment includes a selector for selecting one of four
possible types of signals, corresponding to four respec-
tive levels of awareness: awake and alert; concentration;
attention; and relaxation. However, the invention is not
so limited, as the generator 300 may be capable of pro-
ducing other possible types of signals. Alternatively,
pre-set patterns in the generator 300 may vary when
specialized use is required. The key to this embodiment
is its portability, enabling the user to carry the device
everywhere. The device is battery-operated, and is
smali enough to fit in an upper coat pocket, for example.
FIGS. 9A-9M show examples of prestored patterns
produced by the generator 300, and of results achieved
in use. FIG. 9A shows baseline brain waves, with rela-
tive power output shown at the right for different fre-
quencies. FIGS. 9B, 9E, 9H, and 9K show the stimulus
frequencies produced for four different respective states
of consciousness. FIGS. 9C, 9F, 9I, and 9L show the
stimulus waves corresponding to the superposition of
the stimulus frequencies on the baseline wave. FIGS.
9D, 9G, 97, and 9M show the results achieved in use. As
can be seen, the peak-to-peak amplitudes for the re-
sponse brain waves correspond closely to those of the
stimulus waves.
While the present invention has been described in
detail with reference to preferred embodiments, various
modifications within the scope and spirit of the inven-
tion will be apparent to those of working skill in this
technological field. Consequently, the invention should
be considered as limited only by the scope of the ap-
pended claims.
What is claimed is: |
1. A method of inducing desired states of conscious-
ness in human beings, comprising the following steps:
combining a plurality of replicated electroencephalo-
gram (EEG) waveforms, each indicative of a par-
ticular desired state of consciousness, to produce a
combined EEG waveform;
superimposing said combined EEG waveform on
two separate sets of carrier waves using stereo
` sound;
creating differential beat frequencies between said
sets of carrier waves based on said superimposing
Step; and
providing the resulting signals in audio form to re-
spective ears of a human being, to induce said state
of consciousness.
2. А method as claimed in claim 1, wherein said com-
bining step comprises mathematically averaging said
EEG waveforms to produce said combined EEG wave-
form.
3. A method as claimed in claim 1, further comprising
the step of repeating said combining, superimposing,
and creating steps for each of a set of desired states of
consciousness, and producing a cycle of sets of resulting
audio signals, said providing step comprising providing
said cycle of sets of resulting audio signals to respective
ears of a human being, to induce each of said desired
states of consciousness in cyclic fashion.
4. A method as claimed in claim 3, wherein said cycle
corresponds to human sleep patterns, said desired states
20
25
35
40
45
50
55
60
65
10
of consciousness comprising wakefulness, alpha sleep,
delta sleep, and theta sleep.
5. А method as claimed in claim 3, wherein said cycle
corresponds to human sleep patterns, said desired states
of consciousness comprising alpha sleep, delta sleep,
and theta sleep, said cycle being approximately 90 min-
utes long.
6. A method as claimed in claim 5, said method fur-
ther comprising the steps of providing a plurality of
repetitions of said cycle, followed by providing a set of
audio signals containing a binaural beat at a frequency
indicative of beta consciousness.
7. A method as claimed in claim 1, wherein said creat-
ing step includes the step of combining pink sound with
said sets of carder waves by shifting of said pink sound
with respect to said combined EEG waveform from
one stereo audio channel to another, with cyclic
changes in amplitude, frequency, and rate of panning.
8. Apparatus for facilitating sleep in a human subject,
comprising:
means for setting a wake-up time to select a desired
sleep duration;
means for generating a first sequence of signals in a
cycle corresponding to a human sleep pattern,
frequencies of said signals in said first sequence
being substantially equal to frequencies of human
brain patterns at different levels of sieep;
means for repeating said cycle a plurality of times
based on the selected wake-up time; and
means for waking up said human subject at the se-
lected wake-up time. |
`9. Apparatus as claimed in claim 8, wherein said
means for waking up said human subject comprises
means for generating a second sequence of signals a
predetermined time before the selected wake-up time,
frequencies of said signals in said second sequence being
substantially equal to frequencies of human brain pat-
terns at or near an awakened state.
10. Apparatus às claimed in claim 9, wherein said
predetermined time is approximately five minutes.
11. Apparatus as claimed in claim 8, wherein said first
sequence of frequencies comprises, in order, alpha fre-
quencies, theta frequencies, delta frequencies, and theta
frequencies.
12. Apparatus as claimed in claim 8, further compris-
ing means for generating phased pink sound in conjunc-
tion with said first sequence of frequencies.
13. Apparatus as claimed in claim 8, wherein said first
sequence of signals comprises a plurality of sets of com-
bined brainwaves, each of said sets corresponding to а
different level of sleep. said combined brainwaves
within a given set being constituted by combined elec-
troencephalogram (EEG) waveforms of a plurality of
individuals, taken when said individuals had attained a
different respective level of sleep.
14. Apparatus as claimed in claim 43, wherein said
EEG waveforms are mathematically averaged.
15. Apparatus for awakening an individual using
brain pattern entrainment, said apparatus comprising:
means for selecting a wake-up time;
means for keeping time; and
means, operative a predetermined period before said
wake-up time as determined by said means for
keeping time, for producing а first sequence of
signals having frequencies in the theta-alpha range,
followed by a second sequence of signals having
frequencies in the beta-gamma range.
223 / 340
235 / 570
236 / 569
5,356,368
11
16. Apparatus as claimed in claim 15, wherein said
means for producing said first and second sequences of
signals comprises means for producing said second se-
quence of signals at a higher amplitude than said first
sequence of signals.
17. Apparatus.as claimed in claim 15, wherein said
first sequence of signals comprises a plurality of sets of
combined brainwaves, each of said sets corresponding
to a different level of consciousness, said combined
brainwaves within a given set being constituted by com-
bined electroencephalogram (EEG) waveforms of a
piurality of individuals, taken when said individuals had
attained a different respective level of consciousness.
18. Apparatus as claimed in claim 16, wherein said
EEG waveforms are mathematically averaged.
19. Apparatus for inducing a desired state of con-
sciousness, said apparatus comprising:
means for detecting presence of a predetermined
level of ambient noise;
means, responsive to said detecting means, for gener-
ating signals having frequencies substantially equal
to frequencies of human brain patterns when said
ambient noise is present; and
means for selecting said signals in accordance with
desired human activity in said areas.
20. Apparatus as claimed in claim 19, further compris-
ing timer means, connected to said generating means,
for generating said signals for a predetermined time set
by said timer means.
21. Apparatus as claimed in claim 19, wherein said
timer means is connected to said selecting means to
enable selection of different ones of said signals in ac-
cordance with desired human activity at different times
of day. :
22, Apparatus as claimed in claim 19, wherein said
generating means comprises means, responsive to said
detecting means, for increasing an amplitude of said
signals in response to an increase in amplitude of said
ambient noise, and for decreasing an amplitude of said
10
20
25
35
40
45
50
55
60
65
12
signals.in response to а decrease in amplitude of said
ambient noise.
23. Apparatus as claimed in claim 22, wherein said
generating means further comprises means for discon-
tinuing said signals when said ambient noise fails below
said predetermined level.
24. Apparatus as claimed in claim 19, wherein said
generating means comprises a digital signal processor
and a read-only memory (ROM) connected to said digi-
tal signal processor, said ROM storing a plurality of sets
of signals, each of said sets of signals having frequencies
substantially equal to human brain patterns at a desired
state of consciousness.
25. Apparatus 25 claimed in claim 24, wherein each of
said sets of signals comprises a plurality of sets of com-
bined brainwaves, each of said sets corresponding to а
different level of consciousness, said combined brain-
waves within a given set being constituted by combined
electroencephalogram (EEG) waveforms of a plurality
of individuals, taken when said individuals had attained
a different respective state of consciousness.
26. Apparatus as claimed in claim 25, wherein said
EEG waveforms are mathematically averaged.
27. Apparatus for awakening an individual using
brain pattern entrainment, said apparatus comprising:
means for selecting a wake-up time; and
means, operative a predetermined period before said
wake-up time, for producing a first sequence of
signals having frequencies in a first predetermined
range corresponding to a first state of conscious-
ness, followed by a second sequence of signals
having frequencies in a second predetermined
range corresponding to a second state of conscious-
ness.
28. Apparatus as claimed in claim 27, wherein said
first predetermined range is the theta-alpha range, and
said second predetermined range is the beta-gamma
Tange.
k ж ж ж ж
224 / 340
236 /570
PDF SECTION:
UNITED STATES PATENTS.
E
238 / 569
United States Patent пя
Lowery
НО
US005159703A
[11] Patent Number: 5,159,703
[4] Date of Patent: Oct. 27, 1992
154)
[76]
[21]
[22]
[51]
[52]
[58]
[56]
SILENT SUBLIMINAL PRESENTATION
SYSTEM
Inventor: Oliver M. Lowery, 5188 Falconwood
Ct., Norcross, Ga. 30071
Appl. No.: 458,339
Filed: Dec. 28, 1989
Int, СІЗ ................... НОВ 7/00; HO4R 25/00;
HAR 3/02
U.S. Cl. cene: 455/42; 455/46;
455/66; 381/73.1; 128/420.5
Field of Search ..................... 455/46, 47, 66, 109,
455/110, 42-43; 381/73.1, 105, 124;
358/141-143; 600/28; 128/420.5; 380/38
References Cited
U.S. PATENT DOCUMENTS
3,060,795 10/1962 Corrigan et al. .................... 352/131
3,278,676 10/1966 Becker .................. asss, 358/142
3,393,279 7/1968 Flanagan ........... ... 128/420.5
2,712,292 1/1973 Zentmeyer, Jr. .... 600/28
4,141,344 2/1979 Barbara ........................--. 600/28
SPEECH BALANCED
AMPLIFIER 'ODULATOR
CARRIER
OSCILLATOR
(455 KHz)
FILTER
4,395,600 7/1983 Lundy et al. sse 381/73.1
4,463,392 7/1984 Fischer et al. ........................ 360/30
4,777,529 10/1988 Schultz et al. ... ... 381/731
4,834,701 5/1989 Masaki eem 600/28
4,877,027 10/1989 Brunkan нн 128/420.5
Primary Examiner—Reinhard J. Eisenzopf
Assistant Examiner—Andrew Faile
[57] ABSTRACT
А silent communications system in which nonaural
carriers, in the very low or very high audio frequency
range or in the adjacent ultrasonic frequency spectrum,
are amplitude or frequency modulated with the desired
intelligence and propagated acoustically or vibration-
ally, for inducement into the brain, typically through
the use of loudspeakers, earphones or piezoelectric
transducers. The modulated carriers may be transmitted
directly in real time or may be conveniently recorded
and stored on mechanical, magnetic or optical media for
delayed or repeated transmission to the listener.
3 Claims, 3 Drawing Sheets
36 38
OUTPUT
BANDPASS
FILTER
39
ЕТЕКООУКЕ
OSCILLATOR
14,500 Hz
226 / 340
238 / 570
Sheet 1 of 3 5,159,703
Oct. 27, 1992
U.S. Patent
L =
a
9t
119110
ЧОІУЛПаоИ
AON3n0333
EERE
-іЧа
"ЕТШЕ
SSVdüNV8a 3019 11950
GI vl ei
239 / 570
227 / 340
239 / 569
U.S. Patent Oct. 27, 1992 Sheet 2 of 3 5,159,703
14,500 Hz
FIG. 2
FREQUENCY
3anitlaWv
240 / 569 228 / 340 240 / 570
Sheet 3 of 3 5,159,703
Oct. 27, 1992
U.S. Patent
65
1414410
ZH 00G'vl
341114
SSVdONVA
8c
9e
83XIN
ç ld
(ZH» SSP)
HO1VTII2SO
ЕНЕГЕ
ve
0171190
831113 озомупуа
SẸ ec
ЕЕ А
HO33dS
¿ç
ДА
241 / 570
229 / 340
241 / 569
242 / 569
5,139,703
1
SILENT SUBLIMINAL PRESENTATION SYSTEM
BACKGROUND —FIELD OF THE INVENTION
This invention relates in general to electronic audio
signal processing and, in particular, to subliminal pre-
sentation techniques.
BACKGROUND—DESCRIPTION OF PRIOR
ART
Subliminal learning enjoys wide use today and sub-
liminal tapes are being manufactured by a number of
companies in the United States alone. Several decades
of scientific study indicate that subliminal messages can
influence а human’s attitudes and behavior. Subliminal,
in these discussions, can be defined as “below the
threshold of audibility to the conscious mind.” To be
effective however, the subliminally transmitied infor-
mation (called affirmations by those in the profession)
must be presented to the listener’s ear in such a fashion
that they can be perceived and “decoded” by the listen-
er's subconscious mind. We are referring to audio infor-
mation in this discussion, however, information could
be inputted into the subject's subconscious mind
through any of the body's sensors, such as touch, smell,
sight or hearing. As an example, early development
work in the subliminal field utilized motion pictures and
slide projections as the medium. Early research into
visual and auditory subliminal stimulation effects is
exemplified by U.S. Pat. Nos. 3,060,795 of Corrigan, et
al. and 3,278,676 of Becker. U.S. Pat. No. 4,395,600 of
Lundy and Tyler is representative of later develop-
ments in today’s subliminal message techniques.
The majority of the audio subliminal tapes available
today are prepared using one basic technique. That is,
the verbal affirmations are mixed with, and recorded at
a lower level than, a “foreground” of music or sounds
of ocean surf or a bubbling mountain brook or other
similar "masking" sounds. The affirmations are gener-
ally recorded 5 decibels (db) or so below the “fore-
ground” programming and regenerative automatic gain
control is usually applied to permit the affirmations to
change their recorded amplitude in direct proportion to
the short term averaged amplitude of the continually
varying “foreground” material. In other words, the
volume of the affirmations will follow or track the vol-
ume changes of the “foreground” programming, but at
a lower volume level. Circuit provisions are also usually
included to "gate" the affirmations off when the music
amplitude is low or zero. This insures that the affirma-
tions cannot be heard during quiet program periods.
Thus, today's subliminal affirmations can be character-
ized as being "masked" by music or other sounds, of
constantly changing amplitude and of being reduced or
cut off entirely during periods of low or quiet "fore-
ground" programming.
One of the principal, and most widely objected to,
deficiencies in available subliminal tape presentation
techniques is that the presence of the “foreground”
material is intrusive to both the listener and to anyone
else in the immediate area. No matter what "fore-
ground" material is chosen, the fact remains that this
material can be heard by anyone within its range and
presents a definite distraction to other activities such as
conversation, thought, desire to listen to other pro-
gramming such as radio or television, need to сопсеп-
trate, etc. Additionally, and because the tapes are used
repeatedly by the same listener, any "foreground"
10
25
30
40
45
50
55
60
65
2
music or material eventually becomes monotonously
tiring to that listener.
It is the purpose of the following described invention
to eliminate or greatly reduce all of the above deficien-
cies. Although its application to the magnetic tape me-
dium is described in the following discussion, the tech-
nique is equally applicable to most other desired trans-
mission mediums, such as Compact Disc, videocas-
settes, digital tape recorders, Public Address (PA) sys-
tems, background music installations, computer soft-
ware programs, random access memory (RAM), read
only memory (КОМ), “live”, real time applications and
other mediums now in existence or to be developed in
the future.
Implemented on tape cassettes, for example, the sub-
liminal presentation described here is inaudible i.e., high
audio or ultrasonic frequencies, the affirmations are
presented at a constant, high amplitude level, and they
occupy their own “clear channel", non-masked fre-
quency allocations. If desired, the previously described
"foreground" music or other material can be added to
the tape through use of an audio mixer. The "silent"
recordings are inaudible to the user or by others present
and are therefore very effective for use during periods
of sleep or when in the presence of others. Additionally,
the basic requirements of subliminal stimulation are met.
That is, the affirmations are efficiently transmitted to
the ear and, while undetected by the conscious mind,
are perceived by and efficiently decoded by the subcon-
scious mind.
OBJECTS OF THE INVENTION
Accordingly, several objects and advantages of my
invention are:
(a) to provide a technique for producing a subliminal
presentation which is inaudible to the listeners(s), yet is
perceived and demodulated (decoded) by the саг for
use by the subconscious mind.
(b) to provide a technique for transmitting inaudible
subliminal information to the Jistener(s) at a constant,
high level of signal strength and on a clear band of
frequencies.
(c) to provide a technigue for producing inaudible
subliminal presentations to which music or other "fore-
ground" programming may be added, if desired.
Stili further objects and advantages will become ap-
parent from a consideration of the ensuing description
and drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
In the drawings, the first digit of each component
number also refers to the figure number where that
component can be located.
FIG. 1 represents the block diagram of a suitable
system which will generate a frequency modulated
(FM) signal at 14,500 Hz.
FIG. 2 represents an approximation of the frequency
response curve of the human ear and the signal decod-
ing process.
FIG. 3 represents the block diagram of a suitable
system which wil! generate a single sideband, sup-
pressed carrier, amplitude modulated (AM) signal at
14,500 Hz.
REFERENCE NUMERALS IN DRAWINGS
1i microphone or other 14 low distortion
230 / 340
242 / 570
243 / 569
5,189,703
3
-continued
REFERENCE NUMERALS IN DRAWINGS
audio input signal
12 audio preamplifier
if required
13 frequency modulation
circuil
21 point on low freq end
response curve between points 23 and 24
22 point on low freq end 26 speaker output of FIG. 110
of ear response curve ear
23 point on high freq end 27 demodulated subliminal
of ear response curve audio inputted to ear
24 point on high freq end 31 microphone
of ear response curve
32 speech amplifier
audio oscillator
15 high pass or band
pass audio filter
16 output to tape
recorder or other device
25 midpoint on curve
33 balanced modulator
34 carrier oscillator 35 filter
(455 KHz)
36 mixer 37 heterodyne oscillator
(469.5 KHz)
38 bandpass filter 39 output signal
DETAILED DESCRIPTION OF A PREFERRED
EMBODIMENT
Piease refer now to FIG. 1 and FIG. 2, which are
drawings of a preferred implementation of the inven-
поп.
The principle of operation of the silent subliminal
presentation system is as follows:
An audio signal in the upper frequency region of the
audio spectrum (for exampie, 14,500 Hz) is moduiated
with the desired information. The type of modulation
may be any type suitable for subliminal applications;
frequency modulation (FM), phase modulation (PM),
upper single sideband with suppressed carrier, ampli-
tude modulation (AM), tone modulation, etc.
For broadest application, the high audio frequency
selected as the carrier frequency must meet two basic
criteria:
(1) be high enough in the audio spectrum that its
presence to the human ear is essentially unnoticed or
undetectable (without the listener being informed that
the signal is actually present) and,
(2) be low enough in the audio spectrum that it (and
its modulation content) can produce a useful output
power from home entertainment type cassette or reel-
to-reel magnetic recorders.
This would also include, of course, small portable and
automobile tape decks.
Alternatively, the output of the system can be fed
directly into an audio amplifier and its speaker/ear- |
phone system, Public Address system, etc.
FIG. 1 provides the block diagram of an example of
a system capable of generating the desired silent fre-
quency modulated carrier.
The modulation information is inputted into the mi-
crophone 11. Other suitable input devices may be sub-
stituted for microphone 11, such as a tape recorder or a
radio. Тһе microphone 11 is connected to the preampli-
fier 12 and should have provisions for adjusting its gain
15
20
30
35
45
55
60
in order that the optimum modulation index сап be set `
in the frequency modulator 13. The frequency modula- :
tor 13 modulates the frequency of oscillator 14 which
has been adjusted for an output of 14,500 Hz as de-
scribed above. The output of oscillator 14 is fed through
a suitable bandpass filter 15 into the tape recorder or
directly into a suitable amplifier/speaker system. It is
the purpose of the bandpass filter to remove or attenu-
65
4
ate audible products of the modulation process in order
to maintain as audibly silent an output as practical.
On the receiving end, FIG. 2 represents an approxi-
mate and idealized frequency response curve of the:
human ear. The frequency modulated carrier (centered
at 14,500 Hz), as generated above and played through a
tape recorder or amplifier/speaker system, is shown on
FIG. 2 as speaker output 26, impinging upon the upper
slope of the ear's response curve at point 25. The fre-
quency modulated excursions of the speaker output 26
swing between points 23 and 24 on the ear's upper re-
sponse curve. Because the response curve between
points 23 and 25 is relatively linear, this action results in
a relatively linear demodulation of the original modula-
tion intelligence, which is passed on subliminally to the
inner ear. The amplitude of the demodulated output is
not high enough to be detected by the conscious mind
but is sufficient in amplitude to be detected by the sub-
conscious mind. In the field of communications engi-
neering design, the above demodulation process in
known as slope detection and was used in early FM
receiver design. In those receivers, the response curve
was formed by the action of a tuned (inductive/capaci-
tance) circuit. In our case, the response curve is formed
by the natural response curve of the human ear. The
same slope detection technique can be performed at the
low frequency end of the human ear response curve.
This region is indicated on F1G. 2 as between points 21
and 22. This region, however, has a much smaller avail-
abie bandwidth and is therefore more restricted as to
the amount of information that can be transmitted in ап
inaudible manner.
In practice, the listener adjusts the volume control of
the tape recorder or amplifier to a level just below that
at which the listener hears an audible sound or noise
from the speaker of the tape recorder. If the recording
process is properly done, a spectrum analyzer or a cali-
brated sound level] meter wil! reveal a strong signal
emanating from the tape recorder speaker. A calibrated
sound level meter, at a distance of ] meter (with C
weighting and referenced to the standard of 0.0002
micro bar) wil} typically indicate a silent power output
of from 60 to 70 decibeis. This is equivalent to the audio
power of a loud conversation, yet, in the described
system, is inaudible or unnoticed by the listener.
FIG. 3 illustrates a system which generates a suitable
amplitude modulated (AM) signal, instead of the fre-
quency modulated (FM) system described above. The
output is a modulated, single sideband (SSB), sup-
pressed carrier (AM) signal at 14,500 Hz.
The block diagram represents a common scheme for
generating an SSB signal and will be briefly described.
The desired sublimina! information is spoken into
microphone 31. This signal is amplified by speech am-
plifier 32 and injected into one port of balanced modula-
tor 33. A continuous wave signal of 455 KHz is gener-
ated by carrier oscillator 34 and is injected into the
second port of balanced modulator 33. The output of
balanced modulator 33 is a double sideband, suppressed
carrier signal at 455 KHz. This signal is fed through
filter 35, causing one of the two sidebands to be re-
moved. This signal is fed into one port of mixer 36. A
continuous wave signal at a frequency of 469.5 KHz
from hetrodyne oscillator 37 is fed into the other port of
mixer 36, resulting in an output of the original sublimi-
nal audio information but translated 14,500 Hz higher in
frequency. The bandpass filter 38 attenuates signals and
noise outside of the frequencies of interest. The ampli-
231 / 340
243 / 570
244 / 569
5,159,703
5
tude modulated audio output signal is shown as output
39.
Thus, as stated earlier, my invention provides a new
system for subliminal presentations which is:
(a) silent,
(b) outputs a constant, high level modulated signal and,
(c) occupies a band of clear channel frequencies.
Тһе foregoing description of the preferred embodi-
ment of the invention has been presented for the pur-
poses of illustration and description. It is not intended to
be exhaustive or to limit the invention to the precise
form disclosed. Many modifications and variations are
possible in light of the above discussions. It is intended
that the scope of the invention be limited not only by
this detailed. description, but rather by the claims ap-
pended hereto.
What is claimed:
1. A silent communications system, comprising:
(a) amplitude modulated carrier means for generating
signals located in non-aural portions of the audio
and in the lower portion of the ultrasonic fre-
quency spectrum said signals modulated with infor-
mation to be perceived by a listener’s brain and,
(b) acoustic and ultrasonic transducer means for
propagating said signals, for inducement into the
brain, of the listener, and,
15
20
25
30
45
50
55
65
6
(c) recording means for storing said modulated sig-
nals on mechanical, magnetic and optical media for
delayed or repeated transmissions to the listener.
2. A silent communications system, comprising:
(a) frequency modulated carrier means for generating
signals located in non-aural portions of the audio
and in the lower portion of the ultrasonic fre-
quency spectrum, said signals modulated with in-
formation to be perceived by a listener's brain, and;
(b) acoustic and ultrasonic transducer means for
propagating said signals, for inducement into the
brain of the listener, and;
(c) recording means for storing said modulated sig-
nals on mechanical, magnetic and optical media for
delayed or repeated transmissions to the listener.
3. A silent communications system, comprising:
(a) a combination of amplitude and frequency modu-
lated carrier means for generating signals located in
non-aural portions of the audio and in the lower
portion of the ultrasonic frequency spectrum, said
signals modulated with information to be perceived
by a listener's brain, and
(b) acoustic and ultrasonic transducer means for
propagating said signals, for inducement into the
brain of the listener;
(c) recording means for storing said modulated sig-
nals on mechanical, magnetic and optical media for
delayed or repeated transmissions to the listener.
ж + ж ж
232 / 340
244 /570
PDF SECTION:
UNITED STATES PATENTS.
+
United States Patent пя пи Patent Number: 4,858,612
Stocklin | 45) Date of Patent: Aug. 22, 1989
[54] HEARING DEVICE OTHER PUBLICATIONS
Gerkin, G., “Electroencephalography & Clinical Neu-
rophysiology", vol. 135, No. 6, Dec. 1973, рр. 652-633.
Frye et al, "Science", vol. 181, Jul 27, 1973, pp.
[76] Inventor: Philip L. Stocklin, P.O. Box 2111,
Satellite Beach, Fla. 32937
| 356-358.
[21] Appl. No.: 562,742 Bise, William, “Low Power Radio-Frequency and Mi-
crowave Effects on Human Electroencephalogram and
[22] Filed: Dec. 19, 1983 Behavior", Physiol. Chem. & Physics 10 (1978).
Primary Examiner—William E. Kamm
[51] int. Cle ....... ри В бр же вада рибка А6ІМ 1/36 Attorney, Agent, or Firm—Wegner & Bretschneider
[52] U.S. Cl. em 128/422; 178/419 S [57] ABSTRACT
[58] 128/419 R, 419 S, 422, А : PE
128/653, 771, 732, 741, 746, 791, 804; 340/407 А method and apparatus for simulation of hearing in
: mammals by introduction of a plurality of microwaves
into the region of the auditory cortex is shown and
[56] References Cited described. A microphone is used to transform sound
U.S. PATENT DOCUMENTS : signals into electrical signals which are in turn analyzed
3490458 1/1970 Allison 128/421 and processed to provide controls for generating a plu-
3451605 8/1973 а 128/1 R rality of microwave signals at different frequencies. The
3,951,134 4/1976 Malech ........ 777 туз] multifrequency microwaves are then applied to the
4,428,277 1/1984 Zollner et al. 2. 128/419 в — brain in the region of the auditory cortex. By this
method sounds are perceived by the mammal which are
FOREIGN PATENT DOCUMENTS representative of the original: sound received by the
893311 2/1972 Canada see 128/422 microphone. -
2811120 9/1978 Fed. Rep. of Germany ... 128/419 К
= 591196 1/1978 U.S.S.R, see 128/419 R 29 Claims, 7 Drawing Sheets
MICROWAVE AMPLIFIER BANK 18
OSCILLATOR
|
OSCILLATOR
2
OSCILLATOR
N
PN
MICROWAVE RADIATION
GENERATOR
246 / 569 234 / 340 246 / 570
Aug. 22, 1989 Sheet 1 of 7 4,858,612
US. Patent
bl ХУЙ
1091802
3008
م مر ЈСО ————
———W
| NYE
| 1
N A2N300383 ` № 0
1081009 NIV9 OL. Та NE
№
NI
i
г <a
| 26
2 19N300334 Zb
1081102 №У901 55 &
21
— р
| 15
| 438300334 lp
1041802 Му9 01 it
С |
ТІСТІҢ 000
| | 9143
247 / 570
235 / 340
247 / 569
US. Patent Aug. 22, 1989 Sheet 2 of 7 4,858,612
F! 6. 2 | MICROWAVE AMPLIFIER BANK 18
MICROWAVE RADIATION
6E
NERATOR
50 FIG 20
BROADBAND
MICROWAVE 52 20
SOURCE
Lig
ра 26
= %
"
us — |
FN VAM,
PN
Ug
248 / 569 236 / 340 248 / 570
US. Patent Aug. 22, 1989 Sheet 3 of 7 4,858,612
FIG 5
FROM ЕЕ
FI6.4
30!
30
FROMFI
FIG 3
Le
=
со
се
c
249 / 569 237 / 340 | 249 / 570
US. Patent ^ Aug. 22, 1989 Sheet 4 of 7 4,858,612
FIG. 6
64,
г r _—
MICROWAVE
SOUND HEARING
SOURCE GENERATOR WITH
1
1
|
|
|
|
|
|
|
I
|
і
4
\ AD Ta OP 66 HEADPHONE
62 ле
RF- SOUND
SHIELDED
ROOM
FIG. 7
VARIABLE
0501 па
72 VARIABLE
V OSCILLATOR
76 N
250 / 569 238 / 340 250 / 570
US. Patent Aug. 22, 1989 Sheet 5 of 7 4,858,612
سے
í |
x Е: FIG 9
г-0
ТЮ r = 41 —— | —~T01=-1
CS и
АА
HERD -
r = CONSTANT 5 LE È -CONSUNT
Е г, AND Ø RELATED TO CARTESIAN
COORDINATES x,y,z
| d A oe
2
Но 10
SECTION А-А
TRANSFORMATION EQUATIONS
| |
х а ye (er ss 6 кіш
| |
y 04-1 UT [==
t= adr 0< fS 21.
251 / 569 239 / 340
251/570
252 / 569
US. Patent Aug. 22, 1989 Sheet 6 of 7 4,858,612
-MODE NUMBER
Қ” i — ~, 22. ODE NUMBER
/ | (
utu ` У, 3- MODE
а wo Z: “ |; `Y NUMBER
B \ y /; / Г
ка \ 2 „г
` Ñ р
` Z gh
| b s 27,4
LE `~ 22: 22246
85 СІЗ eee ЕВ
LEFT bm ar 5.00 6 pent
P P ud Ба ET
2 / ` `
27 F4 \ `.
Ж. Y 1
f jw a + S:
\ р
N
й `~- 27A
с БКВ
FIG 1
TRANSVERSE ELECTRIC MODES
F1G 12
PRIMARY AUDITORY CORTEX
р!
240 / 340
252 / 570
US. Patent Aug. 22, 1989 Sheet 7 of 7 4,858,612
5.259
SOURCE
LOCATIONS
2,59
e РА
3 IUS EE
Beh aset
N
50 t/s چم
2- 2T
IüOc/s: auct B
0с naL.
400 c/s ae “ы,
800 c/s е N
rj
l600c/s ,.-57
0 0 20 30
DISTANCE FROM
STAPES, mm
BASILAR MEMBRANE DISPLACEMENT
QN COCHLEA
RELATIVE AMPLITUDE
RMS AMPLITUDE, TRANSVERSE ELECTRIC FIELD (RELATIVE UNITS)
09 qo ANGLE д 30°
MODAL PATTERNS ON Ai
ЖАБ
253 / 569 ` 241 / 340 253 / 570
254 / 569
4,858,612
H
HEARING DEVICE
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to devices for aiding of hearing
in mammals. The invention is based upon the perception
`of sounds which is experienced in the brain when the
brain is subjected to certain microwave radiation sig-
nals.
2. Description of the Prior Art
In prior art hearing devices for human beings, it is
well known to amplify sounds to be heard and to apply
the amplified sound signal to the ear of the person wear-
ing the hearing aid. Hearing devices of this type are
however limited to hearing disfunctions where there is
no damage to the auditory nerve or to the auditory
cortex. In the prior art, if there is damage to the audi-
tory cortex or the auditory nerve, it cannot be corrected
by the use of a hearing aid.
During World War II, individuals in the radiation
path of certain radar installations observed clicks and
buzzing sounds in response to the microwave radiation.
It was through this early observation that it became
known to the art that microwaves could cause a direct
perception of sound within a human brain. These buzz-
ing or clicking sounds however were not meaningful,
and were not perception of sounds which could other-
wise be heard by the receiver. This type of microwave
radiation was not representative of any intelligible
sound to be perceived. In such radar installations, there
was never a sound which was generated which resulted
in subsequent generation of microwave signals repre-
sentative of that sound.
Since the early perception of buzzing and clicking,
further research has been conducted into the micro-
wave reaction of the brain. In an article entitled “Possi-
ble Microwave Mechanisms of the Mammalian Ner-
vous System" by Philip L. Stocklin and Brain F. Stoc-
klin, published in the TIT Journal of Life Sciences,
Tower International Technomedical Institute, Inc. P.O.
Box 4594, Philadelphia, Pa. (1979) there is disclosed a
hypothesis that the mammalian brain generates and uses
electro magnetic waves in the lower microwave fre-
quency region as an integral part of the functioning of
the central and peripheral nervous systems. This analy-
sis is based primarily upon the potential energy of a
protein integral in the neural membrane.
Їп ап article by W. Bise entitled "Low Power Radio-
Frequency and Microwave Effects On Human Electro-
encephalogram and Behavior”, Physiol. Chemistry:
Phys. 10, 387 (1978), it is reported that there are signifi-
cant effects upon the alert human EEG during radiation
by low intensity CW microwave electromagnetic en-
ergy. Bise observed significant repeatable EEG effects
for a subject during radiation at specific microwave
frequencies.
SUMMARY OF THE INVENTION
Results of theoretical analysis of the physics of brain
tissue and the brain/skuli cavity, combined with experi-
mentally-determined electromagnetic properties of
mammalian brain tissue, indicate the physical necessity
for the existence of electromagnetic standing waves,
called modes in the living mammalian brain. The mode
characteristics may be determined by two geometric
properties of the brain; these are the cephalic index of
the brain (its shape іп prolate spheroidal coordinates)
10
20
25
40
45
50
55
60
65
242 / 340
2
and the semifocal distance of the brain (a measure of its
size). It was concluded that estimation of brain cephalic
index and semifocal distance using external skull mea-
surements on subjects permits estimation of the subjects
characteristic mode frequencies, which in turn will
permit a mode by mode treatment of the data to simu-
late hearing. f
This invention provides for sound perception by indi-
viduals who have impaired hearing resulting from ëar
damage, auditory nerve damage, and damage to the
auditory cortex. This invention provides for simulation
of microwave radiation which is normally produced by
the auditory cortex. The simulated brain waves are
introduced into the region of the auditory cortex and
provide for perceived sounds on the part of the subject.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows the acoustic filter bank and mode con-
trol matrix portions of the hearing device of this inven-
. tion.
FIG. 2 shows the microwave generation and antenna
portion of the hearing device of this invention.
FIG. 3 shows a typical voltage divider network
which may be used го provide mode partition.
FIG. 4 shows another voltage divider device which
may be used to provide mode partition.
FIG. 5 shows a voltage divider to be used as a mode
partition wherein each of the resistors is variable in
order to provide adjustment of the voltage outputs.
FiG. 6 shows a modified hearing device which in-
cludes adjustable mode partitioning, and which is used
to provide initial calibration of the hearing device.
FIG. 7 shows à group of variable oscillators and
variable gain controls which are used to determine
hearing characteristics of a particular subject.
FIG, 8 shows a top view of a human skull showing
the lateral dimension.
FIG. 9 shows the relationship of the prolate spherical
coordinate system to the cartesian system.
_ FIG. 10 shows a side view of a skull showing the
medial plane of the head, section А—А,
FIG. 11 shows a plot of the transverse electric field
amplitude versus primary mode number M.
FIG. 12 shows a left side view of the brain and audi-
tory cortex.
FIG. 13 shows the total modal field versus angle for
source location.
DETAILED DESCRIPTION OF THE
PREFERRED EMBODIMENT
This invention is based upon observations of the `
physical mechanism the mammalian brain uses to per-
ceive acoustic vibrations, This observation is based in
part upon neuro anatomical and other experimental
evidence which relates to microwave brain stimulation
and the perception of sounds.
It is has been observed that monochromatic acoustic
stimuli (acoustic tones, or single tones) of different tre-
quencies uniquely stimulate different regions of the
cochlea. It has also been observed that there is a corre-
sponding one to one relationship between the frequency
of a monochromatic acoustic stimulus and the region of
the auditory cortex neurally stimulated by the cochlear
nerve under the physiologically normal conditions
(tonotopicity).
It is has been observed that for an acoustic tone of a
frequency which is at the lower end of the entire acous-
c
254 / 570
255 / 569
4,858,612
3
tical range perceivable by a person, that a thin lateral
region (“Line”) parallel to the medial axis of the brain
and toward the inferior portion of the primary auditory
cortex is stimulated. For an acoustic tone whose fre-
quency is toward the high end of the entire perceivable
acoustic range, a thin lateral region parallel to the me-
dial axis and toward the superior portion of the primary
auditory cortex is stimulated.
Neural stimulation results in the generation of a broad
band of microwave photons by the change in rotational
energy state of protons integral to the neuron mem-
brane of the auditory cortex. The physical size and
shape of the brain/skull cavity, together with the (semi-
conductor) properties (conductivity and dielectric con-
stant) of the brain tissue provide an electromagnetic
resonant cavity. Specific single frequencies are con-
structively reinforced so that a number of standing
electromagnetic waves, each at its own single electro-
magnetic frequency in the microwave frequency re-
gion, are generated in the brain. Each such standing
electromagnetic wave is called a characteristic mode of
the brain/skull cavity.
Analysis in terms of prolate spheroidal wave func-
tions indicates that transverse electric field components
of these modes have maxima in the region of the audi-
tory cortex. This analysis further shows that transverse
electric field possess a variation of amplitude with angle
in the angular plane (along the vertical dimension of the
auditory cortex) and that is dependent only upon the
primary mode number.
The anditory cortex in the normally functioning
mammalian brain is a source of microwave modes. The
auditory cortex generates these modes in accordance
with the neural stimulation of the auditory cortex by the
cochlear nerve. Mode weighting for any one acoustic
tone stimulus is given by the amplitude of each mode
along the line region of the auditory cortex which is
neurally stimulated by that acoustic tone stimulus. A
listing of mode weighting versus frequency of acoustic
stimulus is called the mode matrix.
Іп this invention, the functions of the ear, the coch-
lear nerve, and the auditory cortex are simulated. Mi-
crowaves simulating the mode matrix are inserted di-
rectly into the region of the auditory cortex. By this
insertion of simulated microwave modes, the normal
operation of the entire natural hearing mechanism is
simulated,
Referring now to FIG. 1 and FIG. 2 there is shown
an apparatus which provides for induced perception of
sound into a mammalian brain. This hearing device
includes a microphone 10 which receives sounds, an
acoustic filter bank 12 which separates the signais from
the microphone into component frequencies, and a
mode control matrix 14 which generates the mode sig-
nals which are used to control the intensity of micro-
wave radiations which are injected into the skull cavity
in the region of the auditory cortex.
The acoustic filter bank 12 consists of a bank of
acoustic filters Ft through Fk which span the audible
acoustic spectrum. These filters may be built from stan-
dard resistance, inductance, and capacitance compo-
nents in accordance with well established practice. in
the preferred embodiment there are 24 filters which
correspond to the observed critical bandwidths of the
human ear. In this preferred embodiment a typical list of
filter parameters is given by Table 1 below:
40
50
60
65
4
TABLE I
Filter No. Center Frequency (Hz) Bandwidth (Hz)
1 50 less than 100
2 150 100
3 250 100
4 350 100
5 450 10
6 570 120
7 700 140
8 840 130
9 1,000 160
10 1,170 190
и 1,370 210
12 1,600 240
13 1,850 280
14 2,150 320
15 2,500 380
16 2,900 450
1? 3,400 550
18 4000 700
19 4,800 900
20 5,800 1,100
21 ç 7,000 1,200
22 8,500 1,800
23 10,500 2,500
24 13,500 3,500
Тһе rectifier outputs one through K are feed to К
mode partition devices. The mode partitioning devices
each have N outputs wherein N is the number of micro-
wave oscillators used to generate the microwave radia-
tion. The outputs 1 through N of each mode partition
device is applied respectively to the inputs of each gain
controlled amplifier of the microwave radiation genera-
tor. The function of the mode control matrix 14 is the
control of the microwave amplifiers in the microwave
amplifier bank 18. in the preferred embodiment thus
will be 24 outputs and 24 microwave frequency oscilla-
tors.
Connected to each microwave amplifier gain control
line is a mode simulation device 16 which receives
weighted mode signals from the mode partition devices
14. Each mode simulation device consists of one
through k lines and diodes 17 which are each connected
to summing junction 19. The diodes 17 provide for
isolation from one mode partition device to the next.
The diodes 17 prevent signals from one mode partition
device from returning to the other mode partition de-
vices which are also connected to the same summing
junction of the mode summation device 16. The diodes
also serve a second function which is the rectification of
the signals received from the acoustic filter bank by
way of the mode partition devices. In this way each
mode partition device output is rectified to produce a
varying DC voltage with major frequency components
of the order of 15 milliseconds or less. The voltage at
the summation junction 19 is thus a slowly varying DC
voltage.
The example mode partition devices are shown in
greater detail in FIGS. 3, 4, and 5. The mode partition
devices are merely resistance networks which produce
1 through N output voltages which are predetermined
divisions of the input signal from the acoustic filter
associated with the mode partition device. FIG. 3
shows a mode partitioning device wherein several out-
puts are associated with each series resistor 30. In the
embodiment depicted in FIG. 4 there is an output asso-
ciated with each series resistor only, and thus there are
N series resistors, or the same number of series resistors
as there are outputs. The values of the resistors in the
mode partition resistor network are determined in ac-
243 / 340
255 / 570
256 / 569
4,858,612
5
cordance with the magnitudes of the frequency compo-
nent from the acoustic filter bank 12 which is required
at the summation point 19 or the gain control line for
amplifiers 20.
The microwave amplifier bank 18 consists of a plural-
ity of microwave oscillators 1 through М each of which
is connected to an amplifier 20. Since the amplifiers 20
аге gain controlled by the signals at summation junction
19, the magnitude of the microwave output is con-
trolled by the mode control matrix outputs F1 through
Е, In the preferred embodiment there are 24 amplifiers.
The leads from the microwave oscillators 1 through
N to tlie amplifiers 20 are shielded to prevent cross talk
from one oscillator to the next, and to prevent stray
signals from reaching the user of the hearing device.
The output impedance of amplifiers 20 should be 1000
ohms and this is indicated by resistor 21. The outputs of
amplifiers 20 are all connected to а summing junction
22. The summing junction 22 is connected to a summing
impedance 23 which is approximately 50 ohms. The
relatively high amplifier output impedance 21 as сош-
pared to the relatively low summing impedance 23
provides minimization of cross talk between the amplifi-
ers. Since the amplitude of the microwave signal needed
at the antenna 24 is relatively small, there is no need to
match the antenna and summing junction impedances to
the amplifier 20 output impedances. Efficiency of the
amplifiers 20 is not critical.
Level control of the signal at antenna 24 is controlled
by pick off 25 which is connected to the summing impe-
dance 23. In this manner, the signal at antenna 24 can be
varied from 0 (ground) to a value which is acceptable to
the individual.
The antenna 24 is placed next to the subject’s head
and in the region of the subject's auditory cortex 26. By
placement of the antenna 24 in the region of the audi-
tory cortex 26, the microwave field which is generated
simulates the microwave field which would be gener-
ated if the acoustic sounds were perceived with normal
hearing and the auditory cortex was functioning nor-
maliy.
In FIG. 2A there is shown a second embodiment of
the microwave radiation and generator portion of the
hearing device. In this embodiment a broad band micro-
wave source 50 generates microwave signals which are
feed to filters 52 through 58 which select from the broad
band radiation particular frequencies to be transmitted
to the person. As in FIG. 2, the amplifiers 20 receive
signals on lines 19 fzom the mode control matrix. The
signals on lines 19 provide the gain control for amplifi-
ers 20. |
In FIG. 6 there is shown a modified microwave hear-
ing generator 60 which includes a mode partition resis-
tor divider network as depicted in FIG. 5. Each of the
mode partition voltage divider networks in this embodi-
ment are individually adjustable for all of the resistances
in the resistance network. FIG. 5 depicts a voltage
division system wherein adjustment of the voltage parti-
tion resistors is provided for. —
In FIG. 6, the sound source 62 generates audible
sounds which are received by the microphone of the
microwave hearing generator 60. In accordance with
the operation described with respect to FIGS. 1 and 2,
microwave signals are generated at the antenna 10 in
accordance with the redistribution provided by the
mode control matrix as set forth in FIG. 5.
The sound source 62 also produces a signal on line 64
which is received by a head phone 66. The apparatus
15
20
25
6
depicted in FIG. 6 is used to calibrate or fit a micro-
wave hearing generator to a particular individual. Once
the hearing generator is adjusted to the particular indi-
vidual by adjustment of the variable resistors in the
adjustable mode partition portion of the hearing genera-
tor, a second generator may be built using fixed value
resistors in accordance with the adjusted values
achieved in fitting the device to the particular subject.
The sound produced by headphone 66 shouid be the
same as a sound from the sound source 62 which is
received by the microphone 10 in the microwave hear-
ing generator 60. In this way, the subject can make
comparisons between the perceived sound from the
hearing generator 60, and the sound which is heard
from headphone 66. Sound source 62 also produces a
signal on 68 which is feed to cue light 69. Cue light 69
comes on whenever a sound is emitted from sound
source 62 to the microwave generator 60. іп this man-
ner, if the subject hears nothing, he will still be informed
that a sound has been omitted and hence that he is in-
deed perceiving no sound from the microwave hearing
generator 60.
In FIG. 7 there is shown a modified microwave hear-
ing generator which may be used to determine a sub-
ject's microwave mode frequencies. In this device, the
acoustic filter bank and the mode control matrix have
‚ been removed and replaced by voltage level signal
40
45
50
60
generated by potentiometers 70. Also included are a
plurality of variable frequency oscillators 72 which feed
microwave amplifiers 74 which are gain controlled
from the signal generated by potentiometers 70 and pick
off arm 76.
This modified microwave hearing generator is used
to provide signals using one oscillator at a time. When
an oscillator is turned on, the frequency is varied about
the estimated value until a maximurn acoustic percep-
tion by the subject is perceived. This perception how-
ever may consist of a buzzing or hissing sound rather
than a tone because only one microwave frequency is
being received. The first test of perception is to deter-
mine the subject's lowest modal frequency for audition
(M=1). Once this modal frequency is obtained, the
process is repeated for several higher modal frequencies
and continued until no maximum acoustic perception
Occurs.
Another method of determination of a subject's
modal frequencies is through anatomical estimation.
This procedure is by measurement of the subject’s ce-
phalic index and the lateral dimensions of the skull. In
this method, the shape is determined in prolate spheroi-
dal coordinance.
Purely anatomical estimation of subject’s modal fre-
quencies is performed by first measuring the maximum
Їаѓегаі dimension (breadth) L, FIG. 8, of the subject's
head together with the maximum dimension D (anterior
to posterior) in the medial plane of the subject’s head. D
is the distance along Z axis as shown in FIG. 10. The
ratio L/D, called in anthropology the cephalic index, is
monotonically related to the boundary value Е defining
the ellipsoidal surface approximating the interface be-
tween the brain and the skull in the prolate spheroidal
coordinate system. & defines the shape of this interface;
Ë; and D together give an estimate of a, the semi-focal
distance of the defining ellipsoid. Using & and a, to-
gether with known values of the conductivity and di-
electric constants of brain tissue, those wavelengths are
found for which the radial component of the electric
field satisfies the boundary condition that it is zero at ğo.
244 / 340
256 / 570
257 / 569
4,858,612
7
These wavelengths are the wavelengths associated with
the standing waves or modes; the corresponding fre-
quencies are found by dividing the phase velocity of
microwaves in brain tissue by each of the wavelengths.
A subject's microwave modal frequencies may also
be determined by observing the effect of external micro-
wave radiation upon the EEG. The frequency of the M
equal 1 mode may then be used as a base point to esti-
mate all other modal frequencies.
A typical example of such an estimation is where the
subject is laterally irradiated with a monochromatic
microwave field simultaneous with EEG measurerment
and the microwave frequency altered until a significant
change occurs in the EEG, the lowest such frequency
causing a significant EEG change is found. This is iden-
tified as the frequency of the M—1 mode, the lowest
mode of importance in anditory perception. The purely
anatomical estimation procedure (FIGS. 8, 9, 10) is then
performed and the ratio of each modal frequency to the
M= 1 modal frequency obtained. These ratios together
with the experimentally-determined M=1 frequency
are then used to estimate the frequencies of the mode
numbers higher than 1. The prolate spheroidal coordi-
nate system is shown in FIG. 9. Along the lateral plane
containing the x and y coordinates of FIG. 9, the pro-
late spheroidal coordinate variable ф (angle) lies FIGS.
9 and 10. Plots of the transverse electric field amplitude
versus primary mode number m are shown in FIG. 11.
The equation is
EvransversAM, d) = E, sin(m p} "
The “elevation view" FIG. 12, of the brain from the left
side, shows the primary auditory cortex 10. The iso-
tone lines and the high frequency region are toward the
top of 100 and the low frequency region toward the
bottom of 100.
The formula I, set forth below is the formuia for
combining modes from an iso-tone line at ф=ф} being
excited to obtain the total modai field at some other
angular location ф. For this formula, if we let J=1 (just
one iso-tone single frequency acoustic stimulus line),
then it can be shown that ALL modes (in general) must
be used for any ONE tone.
FORMULA I
RMS TRANSVERSE ELECTRIC
FIELD IN ANGULAR PLANE, ДО)
2.4
до) -[ и С і e 00—007 30 isin(mQj) ) |
т-і j=l
tn
20
25
30
35
40
45
50
8
also as the source of frequency goes well above 30° (low
frequency end). is plotted positive downward from 0°
at lateral location as indicates in FIG. 11.
Resistor weightings are obtained from the |sin
(m[ó—ójD|, Formula I. The scale between acoustic
frequency and must be set or estimated from experi-
ment. Approximately 5.25 1° corresponds to а tonal
stimulus at about 2 kHz (the most sensitive region of the
ear) since this source location gives the highest electric
field amplitude.
The apparatus of FIG. 7 may also be used to deter-
mine values for a hearing device which are required for
a particular subject. Once the modal frequencies have
been estimated, the device of FIG. 7 which includes
variable microwave oscillators may be used to deter-
mine values for the oscillators which match the subject,
and to determine resistance values associated with the
mode partition devices of the mode control matrix.
In FIG. 7 manuai control of the amplifier gain is
achieved by potentiometers 76. In this manner the arn-
plifier gains are varied about the estimated settings for
an acoustic tone stimulus in the region of two thousand
Hertz (2 kHz) until maximum acoustic perception and a
purest tone are achieved together. The term purest tone
may also be described as the most pleasing acoustic
perception by the subject. This process may be repeated
at selected frequencies above and below 2 kHz. The
selected frequencies correspond to regions of other
acoustic filter center frequencies of the subject. When
modal frequency (oscillator frequency) апа gain set
values (setting a potentiometer 76) are noted, it is then
possible to calculate fixed oscillator frequencies and
control resistor values for the adjusted hearing device
for this particular subject.
In the event the subject has no prior acoustic experi-
ence, that is deaf from birth, estimated resistor values
must be used. Also, a compiex acoustic stimulation test
including language articulation and pairs of harmoni-
cally related tones may be developed to maximize the
match of the hearing device parameters for those of this
particular subject.
"Typical components for use in this invention include
commercially available high fidelity microphones
which have a range of 50 Hz to 15 kHz with pius or
minus 3 dB variation.
The audio filters to be used with the acoustic filter
bank 12 are constructed in a conventional manner, and
have Q values of about 6. The filters may also be de-
signed with 3 dB down points (4 the bandwidth away
from the center frequency) occurring at adjacent center
frequency locations.
The diodes 17 in the mode control matrix which
provide isolation between the mode partition circuits
55 are commercially available diodes in the audio range.
пари © ee асе сым The microwave oscillators 1 through N and the mi-
E ATTENUATI 5 N LENGAH NANI әсет И лкен crowave amplifiers 20 are constructed with available
m= PRIMARY MODE NUMBER (HIGHEST MODE M) microwave transistors which can be configured either
as oscillators or amplifiers. Examples of the transistors
FIG. 13 shows the resulting total modal field versus 60 are GaAsFET field effect transistors by Hewlitt Pack-
angle ¢ for source location фа! 5.25°, 12.5", etc. With ага known as the НЕЕТ series or silicone bipolar tran-
reference to the set of curves at the left top of this fig- sistors by Hewlitt Packard known as the HXTR series.
ure. А spacing of approximately 7.25" in ф corresponds АП the cable between the oscillators, the microwave
to a tonal difference of about 1 octave. This conclusion amplifiers, and the antenna should be constructed with
is based on the side-lobes of pattern coming from 65 either singie or double shielded coaxial cable.
ф=5.25°, etc. The total filed (value on y-axis) falls con- Тһе antenna 24 for directing microwave signals to
siderably below the top curves for source locations weil the audio cortex 26 should be approximately the size of
below 5.25“ (toward the high acoustic stimulus end) and the auditory cortex. A typical size would be one and
245 / 340
257 / 570
258 / 569
4, 858, 612
9
one half CM high and one haif to one CM wide. The
antenna as shown is located over the left auditory cor-
tex, but the right may also be used. Since the character-
_istic impedance of the brain tissue at these microwave
frequencies is close to 50 ohms, efficient transmission by
commercially available standard 50 ohm coax is possi-
‚ ble.
The invention has been described in reference to the
preferred embodiments. It is, however, to be under-
stood that other advantages, features, and embodiments
may be within the scope of this invention as defined in
the appended claims. .
What is claimed is:
‚ 1. A sound perception device for providing induced
perception of sound into a mammalian brain comprising
in combination: |
means for generating microwave radiation which is
representative of a sound to be perceived, said
means for generating including means for generat-
ing a simultaneous plurality of microwave radia-
tion frequencies and means for adjusting the ampli-
tude of said microwave radiation frequencies in
accordance with the sound to be perceived; and
antenna means located in the region of the auditory
cortex of said mammalian brain for transmitting
said microwave energy into the auditory cortex
region of said brain.
2. A hearing device for perception of sounds compo:
ing in combination:
means for generating a signal representative of
sounds;
means for analyzing said signal representative of said
sounds having an output;
means for generating a plurality of microwave signals
having different frequencies having a input con-
nected to said output of said means for analyzing
said signals, having an output;
means for applying said plurality of microwave sig-
nals to the head of a subject, and
whereby the subject perceives sounds which are rep-
resentative of said sounds.
3. The apparatus in accordance with claim 2 wherein
said means for generating a signal is a microphone for
detecting sound waves.
4. The apparatus in accordance with claim 2 wherein
said means for applying said plurality of microwave
signals is an antenna.
5. The apparatus in accordance with claim 4 wherein
said antenna is placed in the region of the auditory
cortex of the subject.
6. The apparatus in accordance with сізіт 2 wherein
the subject is a human being. |
7. The apparatus in accordance with claim 2 wherein
said means for analyzing said signal comprises:
an acoustic filter bank For dividing said sounds into a
plurality of component frequencies; and |
а mode control matrix means for providing control
signals which are weighted in accordance with said
piurality of component frequencies, having an out-
put connected to said means for generating a plu-
rality of microwave signal inputs.
8. The apparatus in accordance with ciaim 7 wherein
said acoustic filter bank includes a plurality of audio
frequency filters.
9. The apparatus in accordance with claim 8 wherein
said audio frequency filters provide a plurality of output
frequencies having amplitudes which are a function of
said signal representative of sounds.
246 / 340
20
25
30
40
45
50
65
10
10. The apparatus in accordance with claim 9
wherein said amplitudes are the weighted in accordance
with transform function of the signal representative of
sounds.
11. The apparatus in accordance with claim 7
wherein said mode control matrix device includes a
voltage divider. connected to each of said plurality of
said audio frequency filters.
12. The apparatus in accordance with claim 11
wherein each of said voltage dividers has a plurality of
outputs which are connected in circuit to said means for
generating a plurality of microwave signals.
13. The apparatus in accordance with claim 2.
wherein said means for generating a plurality of micro-
wave signals comprises a plurality of microwave gener-
ators each having a different frequency and means for
controlling the output amplitude of each of said genera-
tors.
14. The apparatus in accordance with claims 2
wherein said means for generating a plurality of micro-
wave signals comprises a broad band microwave source
2nd a plurality of filters.
15. Тһе apparatus in accordance with claim 13
wherein said generators each comprise a microwave
signal source and a gain controlled microwave ampli-
fier. |
16. The apparatus in accordance with claim 13
wherein said means for analyzing output is connected to
said means for controlling microwave amplifier output
amplitudes.
17. The apparatus in accordance with claim 13.
wherein analyzing includes К andio frequency filters.
18. The apparatus in accordance. with claim 17
wherein there are N microwave generators.
19. The apparatus in accordance with claim 18 in-
cluding a mode partitioning means which provides N
outputs for each of said K audio frequency filters.
20. The apparatus in accordance with claim 19
wherein said N amplifiers each have K inputs from said
mode partitioning means.
21. The apparatus in accordance with claim 20
wherein said N amplifiers have K inputs less the mode
partitioning means outputs which are so small that they
may be omitted.
22. The apparatus in accordance with claim 20
wherein said mode partitioning output device outputs
each include a diode connected to each microwave
amplifier gain control to provide isolation between all
outputs.
23. The apparatus in accordance with claim 20
wherein said K audio frequency filters are chosen to
correspond to the critical bandwidths of the human ear.
. 24. The apparatus in accordance with claim 20
wherein said N microwave generators are each adjust-
able in frequency output.
25. The apparatus in accordance with сізіп 18
wherein the frequency of each N microwave generators
is determined by anatomical estimation.
26. Тһе apparatus in accordance with claim 18
wherein the frequency of the lowest frequency micro-
wave generator is chosen by determination of the effect
of external microwave generation on the EEG of the
subject.
27. The apparatus in accordance with claim 18
. wherein the frequency of each of said N microwave
generators corresponds to the subject’s microwave
modal frequencies.
258 / 570
259 / 569
4,858,612
11
28. The apparatus in accordance with claim 27
wherein the subject's modal frequencies are determined
by measurement of the subject's cephalic index and the
lateral dimensions of the skull.
29. The apparaius in accordance with claim 28
wherein the subject's lowest modal frequency is deter-
10
20
25
30
35
45
50
55
60
65
12
mined by varying the frequency of the lowest frequency
microwave generator about the estimated value until a
maximum acoustic perception is obtained by the sub-
ject.
Ж ж ж * +
247 / 340
259 / 570
PDF SECTION:
UNITED STATES PATENTS.
551 / 569
United States Patent па
Lundy et al. |
[11] 4,395,600
[45] Jul. 26, 1983
[54] AUDITORY SUBLIMINAL MESSAGE
` ` SYSTEM AND METHOD .
[76] Inventors: Rene В, Lundy, 3016 SE. 39th; David
L. Tyler, 2939 SE. Taylor, both of
Portland, Oreg. 97214 |
[21] Appl No.: 210,645
[22] Filed: . Nov. 26, 1980
[5I] ШшЕС13................. Н04М 15/00; HO4K 1/02
[52] U.S. CL aie ancien 179/1.5 M; 340/348 E;
| 179/1 АА
[58] Field of Search ................ 179/1 АА, ІР, 1.5 M;
_ 340/348 E; 358/183, 22; 430/9; 178/17.5;
| . 250/214 R; 352/130, 131, 201, 81
[56] . References Cited
U.S. PATENT DOCUMENTS
625,627 5/1899 Woody ........4..24..0..а..Д.... 333/81
711,440 10/1902 Relchenbach 352/201
1,356,223 10/1920 . 332/55
2,073,370 3/1937 5 . I78/17.5
2,338,551 1/1944 ————— 179/1 P
2,409,058 10/1946 . 79/1 P
2,501,327 3/1950 . 179/1 P
2,609,294 9/1952 e 430/9
2,706,218 4/1955 „ 352/131
2,730,565 1/1956 „ 358/183
2,784,246 3/1957 .. 358/183
2,788,986 4/1957 174/153 R
2,808,455 10/1957 en 358/22
2,809,298 10/1957 250/214 R
2,931,857 4/1960 Hammond, Jr. et al. .......... 352/130
2,941,044 6/1960 es 179/1 P
2,969,428 1/1961 .. 179/7.1 R
3,060,795 10/1962 igan et al. .................... 352/131
3,173,136: 3/1965 ^ 340/384 E
3,278,676 10/1966 . 358/142
3,410,958 11/1968 . 179/1 P
3,579,233 5/1971 .. 340/384 Е
3,934,084 1/1976 m e. 179/1 P
3,934,085 1/1976 Munson et al. ... ... 179/1 P
4,052,720 10/1977 McGregor et al. ees 179/1 P
4,059,726 11/1977 Watters et al. .... 179/1.5 M
4,061,874 12/1977 Fricke еі al. ...................... 179/1 A
OTHER PUBLICATIONS
Brit. Journal of Psychology, (1979), 254-258; Mykel et
al, Emergence of Unreported Stimuli in Imagery as a
Function of Laterality . . . .
Perceptual and Motor Skill, pp. 375-378, (1974), Zen-
hausern et al., "Differential Effect of Subliminal . . . ".
Proc. of 1978 IEEE, Region 3 СопЕ, 4/10-12/78, At-
lanta, Becker et al., “Subliminal Communication: . . . ".
Applications of Subliminal Video and Audio Stimuli in
. . . Commercial Settings, 3/28/80, Becker et al.
The Living Brain, W. Grey Walter, W. ХУ. Norton and
Co., 1953, pp. 83-113.
The Human Brain, John Pfeiffer, Harper Bros., 1955,
pp- 156-161. | .
Strobe-The Lively Light, Howard Luray, Camera
Craft Publishing, 1949, pp. 11-15.
"Electronic Magic", H. W. Secor, Radio Electronics,
Jun. 1949, pp. 20-22.
"TV Video Switching", John Brush, Television Eng.,
Jul. 1951, pp. 12-15, 29.
"Fighting the Five Finger Discount", American Way,
American Airlines, 11/80, pp. 72 et seq.
“Application of Signal Detection Theory to Subliminal
and Supraliminal Accessory Stimulation”, Zwosta and
Zenhausern, Perceptual and Motor Skills, 1969, pp.
699-704.
Primary Examiner—Sal Cangialosi
Attorney, Agent, or Firm—Klarquist, Sparkman,
Campbell, Leigh, Whinston & Dellett
[57] ABSTRACT
Ambient audio signals from the customer shopping area
within a store are sensed and fed to a signal processing
circuit that produces a control signal which varies with
variations in the amplitude of the sensed audio signals.
A control circuit adjusts the amplitude of an auditory
subliminal anti-shoplifting message to increase with
increasing amplitudes of sensed audio signals and de-
crease with decreasing amplitudes of sensed audio sig-
nals. This amplitude controlled subliminal message may
be mixed with background music and transmitted to the
shopping area. To reduce distortion of the subliminal
message, its amplitude is controlled to increase at a first
rate slower than the rate of increase of the amplitude of
ambient audio signals from the area. Also, the amplitude
of the subliminal message is controlled to decrease at a
second rate faster than the first rate with decreasing
^ 249/340
261 / 570
262 / 569
4,395,600
Page 2
ee
"ambient audio signal amplitudes to minimize the possi- message to provide a composite signal fed to, and con-
bility of the subliminal message becoming supraliminal trolled by, the control circuit.
upon rapid declines in ambient audio signal amplitudes
` in the area. A masking signal is provided with an ampli-
tude which is also controlled in response to the ampli-
‘tude of sensed ambient audio signals. This masking
signal may be combined with the auditory subliminal 29 Claims, 5 Drawing Figures
250 / 340
262 /570
Sheet 1 of 2 4,395,600
Jul. 26, 1983
U.S. Patent
сә
P
9
9
#914 ge
324105
ONY WN9IS 9NDISVW
ыз dW ONY 39VSS3W
IWNIWITENS
| почо
ие омеумалу |
JOVIIOA о
ETA || Á Re ee i
омо 1081
| bbz -A bemti `
1412812
H3ZIS3H.LNAS
3910A
339503534
зам.
п
4119812 наз Талу
омаунз 9NIOVH3AV
TYNSIS SON LIT WY
1109812
НЕЕ
-3Hd
ламмуно OlGnv
1112813
1ум915
SNDISVIN
1412090
43141 LOAY
LIND
313 AV
9377041409
397130۸
002 + vec
есе
102519 9NISS390Hd 17УМ916 Oldnv lIN3ISWV А
почо
ча зпайу
Lin NO2 92
62 | низы: = ope ЁЁ 52 09|
i-e жән | E |
1ум918
- ПЧ
43141 1238 ualdrTdWvadd
"3NNVH2 ООПТ
324005 'VNO9IS
ампочехоув ve зі
— ------- —— = —————— qƏYsÓ@ س
—— mm — ы
4,395,600
Sheet 2 of 2
U.S. Patent Jul. 26, 1983
и 5 m k dian ылы | X J| КЕЙ 1
T | “| | | | < үзі | | "S p
Е Е A Es goce [ow | “1.
E o» wel + ЕРЕН pore м |
тИ se nd |1
a PT | سم | ua | | А Di | | PS d
vel ` |
ро یی ا x Le | Cate
62/ IE t [x auo "ti
x T = =
ا کے ا р T
ЕД ST eT ae
ET [> 21 همل MEE o|
wa O apu ӨЗ” _
PE Е 99 Г. Е ЕС A+ |
| +. E. | | net | EZ En |
| ا9ہ
sors اة A الا ТЕН?
[| -- لص | لسا
264 / 570
252 / 340
264 / 569
4,395,600
1
AUDITORY SUBLIMINAL MESSAGE SYSTEM
AND METHOD
BACKGROUND OF THE INVENTION
The present invention relates to a system and method
for providing subliminal auditory signals to an area such
as a customer shopping area within a store. More partic-
ularly, the invention relates to such a system and
method in which the amplitude of the subliminal signal
is adjusted in response to the amplitude of ambient
audio signals from the customer shopping area.
It has been established that auditory subliminal sig-
nals, that is, those presented below the conscious recog-
nition level of the listener, сап be used to influence the
listener's behavior to some degree. Some early research
into visual and auditory subliminal stimulation effects
are exemplified in U.S. Pat. Nos. 3,060,795 of Corrigan,
et al. and 3,278,676 of Becker. .
In addition, Becker is understood to have experi-
‘mented with the use of auditory subliminal messages to
deter shoplifting by retail store customers. Although
applicants have not seen or studied Mr. Becker's device,
it is believed to.combine an auditory subliminal message
with background music. However, during non-peak
shopping and other times when the store area is excep-
tionally quiet, the background music signal component
in Becker must be much louder than the subliminal
signal as otherwise the subliminal signal would be at a
level such that it may be consciously recognized by a
listener. In addition, as a result of this large difference
between the amplitude of the background music and
that of the subliminal message signal, the effectiveness
of the Becker subliminal message is reduced. Also,
Becker is understood to maintain his combined back-
ground music and subliminal message at a level suffi-
ciently high enough to enable the music to be heard
even under noisy store conditions. However, when the
ambient audio signal level drops, such as during non-
peak store traffic times, the combined background
music and subliminal signai would remain the same and
seem overly loud. Thus, Becker is simply not under-
stood to control the amplitude of a subliminal message
in response to ambient audio signals from an area.
Accordingly, there is a need for an auditory sublimi-
nal message system and method which solves these and
' other problems.
SUMMARY OF THE INVENTION
The present invention is a method and system for
adjusting the amplitude of an auditory subliminal mes-
sage in response to the amplitude of ambient audio sig-
nals from an area to which the subliminal message is to
be transmitted. In accordance with one aspect of the
' invention, an audio signal processing circuit means re-
'ceives signals representing the amplitude of audio sig-
nals іп the area, such as a retail shopping area of a store.
This processing circuit means produces a contro] signal
for an amplitude adjustment or control circuit means
which adjusts the amplitude or volume of an auditory
subliminal signal which is to be transmitted to the area.
- The amplitude of the auditory subliminal signal is ad-
justed to increase with increasing sensed ambient audio
signals and decrease with decreasing sensed ambient
‘audio signals. · - |
As a more specific aspect of the invention, a masking
signal is generated and fed to the area. This masking
signal has frequency. and amplitude characteristics
253 / 340
5
15
20
25
30
35
40
45
50
55
60
65
2
which cover or render the subliminal signal inpercepti-
ble to the conscious recognition level of a listener. In
the preferred embodiment, the amplitude of this mask-
ing signal is also controlled in response to the sensed
ambient audio signals so that its amplitude follows the
amplitude of the adjusted subliminal message signal.
The masking signal may be combined with the sublimi-
nal signal to provide a composite signal having an am-
plitude controlled by the control circuit in response to
the contro! signal.
As a more specific feature of the invention, to reduce
distortion of the subliminal message signal, the process-
ing circuit means produces a control signal which
causes the control circuit means to increase the ampli-
tude of the auditory subliminal message signal slowly at
a rate slower than the rate of change of the ambient
audio signals at times when the ambient audio signals
are increasing in magnitude. In addition, at times when
the ambient audio signals are decreasing to minimize the
possibility of conscious perception of the subliminal
message signal, the processing circuit means produces a
control signal which causes the control circuit means to
decrease the amplitude of the subliminal signal at a fast
rate.
It is accordingly one object of the invention to pro-
vide an improved auditory subliminal message system
and method.
Another object of the invention is to provide an audi-
tory subliminal message having an amplitude which is
adjusted in response to ambient noise levels within an
area to which the auditory subliminal message is to be
transmitted.
A further object of the invention is to provide а
method and system which adjusts the amplitude of an
auditory subliminal message at one rate with increasing
ambient audio signal levels in the area and at another,
faster rate with decreasing ambient audio signal levels.
A still further object of the invention is to provide
such a method and system in which the amplitude of an
auditory subliminal signal is adjusted to rise at a rate
slower than the rate of increases in ambient audio signal
levels. :
Another object of the invention is to provide an audi-
tory subliminal message which is continuously main-
tained below the conscious perception level.
A further object of the invention is to provide an
auditory subliminal message which is maintained below
the conscious perception level of listeners in an area and
which is adjusted in response to ambient audio signals in
the area so as to remain close to the level of conscious
perception.
Still another object of the invention is to provide au
auditory masking signal for an auditory subliminal mes-
sage, the masking signal having an amplitude which is
adjusted in response to ambient noise levels in an area to
which the auditory subliminal message is to be transmit-
ted.
A more specific object of the invention is to provide
an auditory subliminal message anti-shoplifting system
and method.
These and other objects, features and advantages of
the invention will become apparent with reference to
the following drawings and description.
265 / 570
266 / 569
4,395,600
3
BRIEF DESCRIPTION OF THE DRAWING
In the drawing
FIG. 1 is a block diagram of an auditory subliminal
message system in accordance with the present inven- -
tion;
FIG. 2 is a block diagram illustrating one embodi-
ment of an auditory subliminal message signal and
masking signal source;
FIG. 3 is a block diagram showing another embodi-
ment of an auditory subliminal message signal and
masking signal source;
FIG. 4 is a block diagram showing an alternate ambi-
ent audio signal processing circuit; and
FIG. 5 is a detailed circuit schematic diagram of the
ambient audio signal processing circuit and other por-
tious of the circuit of FIG. 1.
DETAILED DESCRIPTION
Genera} Description of Preferred Embodiment
It has now been discovered that in an environment
with constantly changing ambient audio levels, such as
in the shopping area of a store, it is desirable to adjust
the amplitude of an auditory subliminal message signal
to follow the amplitude of the ambient audio signals.
That is, by increasing the amplitude of the auditory
subliminal message with increasing ambient audio levels
and decreasing the amplitude of the subliminal signal
with decreasing ambient audio levels, the subconscious
perception of the subliminal message by listeners is
improved. This in turn increases the effectiveness of the
subliminal message.
Therefore, with reference to FIG. 1, the system in-
cludes circuit means for controlling the amplitude of an
auditory subliminal message signal in response to the
level of ambient sounds in an area 26, such as the cus-
tomer shopping area within a store, to which the sub-
limina! message signal is to be transmitted. Such circuit
means includes an ambient audio signal processing сіг-
cuit 10 and a contro! circuit 12. Control circuit 12 is
adapted to receive an auditory subliminal message sig-
nal input at 14 and processing circuit 10 has at least one
input 16 for receiving signals representing the amplitude
or volume of ambient audio signals within the area.
Processing circuit 10 and control circuit 12 adjust the
amplitude of the auditory sublimina] message signal
received at input 14, in response to the amplitude of
ambient audio signals received at input 16, to produce
an auditory subliminal message signal output at 18 hav-
ing an amplitude which varies with variations in the
level of ambient audio signals in the area.
'The output signal at 18 is fed to an output circuit
which, in the illustrated form, includes an output mixer
circuit 20 having an input coupled to output 18, a pre-
amplifier and amplifier circuit 22 with an input 21 cou-
pled to the output of mixer circuit 20, and a speaker 24
for transmitting the amplitude adjusted auditory sublim-
inal message signal to area 26. The circuit also may
include an optional background auditory signal source
28 which produces music or other background auditory
signals which are fed to an input 29 of the output mixer
circuit 20. These background signals are combined
within mixer circuit 20 with the amplitude controlled
subliminal message signal and the combined signal is
transmitted by speaker 24 to room 26.
The preferred embodiment of the system also in-
cludes at least one audio sensor means, such as micro-
phone 30 positioned within the area 26. Microphone 30
15
220
25
35
40
45
55
60
65
4
detects ambient audio signals within the area and pro-
duces an electrical output signal representing these
detected signals. The microphone output is fed to input
16 of ambient audio signal processing circuit 10.
Processing circuit 10 includes an audio channel 32
associated with microphone 30 for modifying the input
16 to produce an audio channel output signal at 34
which varies with variations in the ambient andio signal
input at 16, as explained below. Preferably, plural mi-
crophones 30, 30а, 305, 30с, 30d, etc. are provided for
detecting ambient audio signals in various parts of the
area 26. For convenience, these microphones may be
positioned in the ceiling of the shopping area. А гезрес-
tive audio channel 32а, 320, 32c and 32d is associated
with each of the microphones 30a, 305, 30c and 304 and
produces output signals 34а, 34b, 34c and 34d in the
same manner as the audio channel 32. The output sig-
nals 34 are averaged by an averaging circuit 36 to pro-
duce an output control signal at 38 which varies with
variations in the amplitude of ambient audio signals
sensed by the microphones throughout the store area
26. E .
In the embodiment of FIG. 1, each audio channel 32
includes a preamplifier circuit 40 for amplifying the
input signal 16, a rectifier circuit 42 for rectifying the
amplified input signal and a signal shaping circuit 44 for
modifying the rectified ambient audio signal input from
microphone 30, as explained below.
In connection with this signal shaping circuit, 3t has
now been discovered that rapid changes of an ampli-
tude of an auditory subliminal signal can distort it to
such an extent that it becomes unrecognizable to sub-
conscious perception. Hence, to reduce such distortion
and increase the subconscious perceptibility of the sub-
liminal signal, the signal shaping circuit adjusts the
control signal to cause the amplitude of the auditory
subliminal message signal at a rate which is slower than
the rate of increase of ambient audio signals at times
when the amplitude of such ambient signals is increas-
ing. However, with sudden drops in the level of ambient
audio signals, a slow drop in the amplitude of the sub-
liminal message could lead to conscious perception of
this message. This can be extremely disadvantageous in
situations wherein it is desired to keep the existence of
the subliminal message a secret. Therefore, the signal
shaping circuit adjusts the control signal to cause the
volume of the auditory subliminal message to drop at a
faster rate upon a decrease in the volume of ambient
audio signals. 2”
Hence, with this form of signal shaping circuit 44, the
control signal output at 38 of the averaging circuit 36
varies at one rate with increasing ambient audio signals
and at another fester rate with decreasing ambient audio
signals. Furthermore, control circuit 12 is responsive to
this varying control signal to produce an amplitude
adjusted auditory subliminal message output at 18
which increases at a first rate with increases in ambient
audio signals and decreases at a second rate, faster than
the first rate, with decreases in ambient audio signals. In
addition, to prevent distortion of the subliminal mes-
sage, the first rate is slower than the rate of increase of
the ambient audio signals.
It has also now been discovered that time lags are
introduced into an auditory subliminal system. Such
time lags are primarily due to the amount of time re-
quired by ambient audio signals is travel to microphones
and the time required by an amplitude controlled sub-
254 / 340
266 / 570
267 / 569
4,395,600
5
liminal message to travel from speakers to a listener.
Thus, no matter how quickly the. system reduces the
amplitude of the. ‘auditory . subliminal message in re-
sponse to declining ambient sound. levels, a reduction in
the amplitude of the subliminal message would lag the
réduction in volume of ambient sound. Thus, а rapid .
drop in ambient sound level could momentarily leave
the subliminal message signal at a level sufficiently high
to be perceived by a listener. In certain applications this
would prove extremely disadvantageous. `
For example, if ап anti-shoplifting subliminal system `
is used to deter shoplifting in a store, customers may be
extremely reluctant tó patronize the store if they con-
sciously perceive a normally anti-shoplifting message
: and hence realize that such a system is in use. Thus,
although a store may realize savings due to a reduction
in shoplifting, its overall profits may suffer because of
customer reluctance to patronize a store wherein such a
system is in use. Hence, in such applications it is desir-
able to maintain. the subliminal signal continuously
. below the conscious perception range of listeners. On
the other hand, in other applications such as in connec-
tion with a weight loss class in which the listeners real-
ize that an auditory subliminal weight loss message is
* being transmitted, it is not as critical to continuously
maintain the subliminal message below: conscious рег-
ception levels.
To solve this problem, the preferred бедері of
the system includes means for producing a masking
signal which screens the auditory subliminal message
and blocks its conscious perception, particularly during
times when the volume of ambient noise drops quickly.
Thus, as illustrated in FIG. 1, the system includes a
subliminal message and masking signal source means 48
which produces the auditory subliminal message signal
fed to input 14 of control circuit 12. In addition, source
48 includes means for providing a masking signal with
amplitude and frequency characteristics which block
conscious perception of the auditory subliminal mes-
sage. The masking signal may bypass control circuit 12
and be fed directly to room 26. However, it is preferable
that the amplitude of the masking signal also be con-
. ‘trolled in response to the amplitude of ambient audio
signals. Otherwise, when the room becomes very quiet,
the masking signal could be во loud that it is readily
perceived and annoying. Also, if the. masking signal
amplitude remained constant while the subliminal signal
amplitude dropped in response to drops in ambient
sound levels; the amplitude of the masking signal would
become so large relative to that of the subliminal mes-
sage, that subconscious perception of the Subliminal
message is impaired.
Although a separate control circuit may be provided
for controlling the amplitude of the masking signals,
preferably the masking signal is combined with the
auditory subliminal message signal and the resulting
composite signal i is fed to input 14 of control circuit 12.
As illustrated in FIG. 1, control circuit 12 тау include
à voltage control amplifier circuit 39 for adjusting the
output 18 in response to the control signal input 38.
As shown in FIG. 2, subliminal message and masking
signal source 48 may comprise a means such as a tape
recorder for playing back a recording of a composite
auditory subliminal message and masking signal. In an
alternate form illustrated in FIG. 3, the subliminal mes-
sage and masking signal source 48 may comprise a voice
synthesizer circuit 50 which produces an auditory sub-
Нпупаї component of. the composite subliminal and
10
6
masking signals. One suitable voice synthesizer circuit
50 comprises a commercially available “Digitalker” kit
produced by National Semiconductor Company. This
kit includes a sixteen kilobite, eight bit memory chip
No. ММ52116 and a speech processor chip designated
SPC. In addition, a masking signal circuit 52 is provided
for producing the masking signal. This circuit may take
various forms and comprise a white noise signal genera-
tor circuit such as a random noise oscillator with an
internal shift register. One suitable generator is available
. from Radio Shack and designated random events gener-
15
20
25
ator chip No. S2688/MM5837. The masking signal cir-
cuit and voice synthesizer circuit outputs are fed to а
commercially available mixer amplifier circuit 54, in
which they are combined. The mixer circuit output
comprises the composite auditory signal which is fed to
input 14 of the control circuit 12.
As previously mentioned, the masking signal has
frequency and amplitude components which make the
auditory subliminal message signal incapable of con-
scious recognition by a listener. More specifically, the
masking signal has frequency components which over-
lay the frequency components of the auditory sublimi-
nal message signal. In addition; the amplitude of the
masking signal is slightly higher than the amplitude of
the auditory subliminal message signal. More specifi-
cally, it has now been discovered that preferred results
. are obtained when the amplitude of the masking signal
30
35
is continuously maintained approximately within the
range of 3 db to 15 db above the amplitude of the sub-
` liminal message signal. Furthermore, that the best re-
sults occur when the masking signal is approximately 5
` db above the amplitude of the auditory subliminal mes-
sage signal. That is, with such relative amplitudes of the
masking signal to the auditory subliminal message sig-
nal, a temporary screen is provided for the subliminal
- message at times, such as during rapid declines in ambi-
40
45
55
65
ent noise levels, when the subliminal message may oth-
erwise become supraliminal. Also, with such relative
amplitudes, the masking signal provides a satisfactory
screen for the subliminal message without impairing
satisfactory subconscious perception of the auditory
subliminal message. It should be noted that with such
relative amplitudes of the masking signal and subliminal
message signal, the masking signal typically may not
block conscious perception of the subliminal signal іп а
situation where the composite subliminal message and
masking signal are at a high amplitude in relation to the
volume of ambient audio signals. However, such condi-
tions are prevented by controlling the amplitude of the
composite signal in response to ambient audio signals, as
explained above.
FIG. 4 illustrates an alternate ambient audio signal
processing circuit. Components of this circuit which are
similar to those of the FIG. 1 form of processing circuit
have numbers incremented by two hundred over the
corresponding numbers in FIG. 1. Hence, these compo-
nents will not be described in detail. Unlike the FIG. 1
form of processing circuit, the audio channels of the
FIG. 4 embodiment do not include the signal shaping
circuit. Instead, the output of the respective rectifier
circuits are averaged by an averaging circuit 236 prior
to signal shaping by a signal shaping circuit 244 in the
manner explained above.
DETAILED CIRCUIT DESCRIPTION
With reference to FIG. 5, a four-channel audio signa!
processing circuit is illustrated. Since each of the illus-
255 / 340
267 / 570
268 / 569
4,395,600
trated channels is identical, only the upper channel will
be described in detail.
The audio channel includes series connected pream-
plifier circuit 40, rectifier circuit 42, and signal shaping
circuit 44, The три! 16 to the channel is obtained from
the microphone 30 (FIG. 1) and thus fluctuates in re-
sponse to changes ín ambient audio signals detected by
the microphone. Input 16 and hence the microphone
output is fed to preamplifier circnit 40. More specifi-
cally, this input is coupled by a 0.1 microfarad capacitor
58 through a one kilohm gain establishing resistor 60 to
the inverting input of an operational amplifier 62. The
output of amplifier 62 is connected through a one meg-
ohm feedback resistor 64 to its inverting input. The gain
of amplifier 62 is established by the ratio of resistors 64
and 60 and, with these particular resistors is set at ap-
proximately one thousand. Also, a positive biasing volt-
age V 1s fed through 2 two megohm biasing resistor 66
to the noninverting input of amplifier 62. With the cir-
cuit components utilized in the FIG. 5 circuit, the posi-
tive biasing voltage is six volts and a negative biasing
voltage is at negative six volts. One suitable amplifier 62
comprises one amplifier section of an LM3900 quad
Norton operational amplifier. When connected as de-
scribed above, amplifier 62 inverts and amplifies the
input signal at 16.
To convert the mput at 16 to a direct current signal,
0.1 microfarad capacitor 68 couples the output of ampli-
fier 62 to the inverting input of an amplifier 70 con-
nected as an amplifying, inverting, precision rectifier.
Rectifier circuit 42 produces an output signal compris-
ing a positive half-cycle inverted and amplified version
of the input signal. More specifically, the output of
amplifier 70 is connected to the anode of a diode 74
having its cathode connected through a one megohm
feedback resistor 76 to the inverting input of amplifier
70. Thus, the positive half-cycles of the output signal
from amplifier 70 are coupled through diode 74 and
resistor 76 to the inverting input of amplifier 70, In
contrast, the negative half-cycle output signals from
amplifier 70 are blocked by diode 74. However, because
the output of amplifier 70 is connected to the cathode of
a diode 72 having its anode coupled to the inverting
input of amplifier 70, these negative going half cycles
are coupled through diode 72 to the inverting input of
amplifier 70. The output of rectifier 42 is taken at the
cathode of diode 74 and comprises a positive represen-
tation of the input signal 16 and hence of the amplitude
of ambient audio signals detected by microphone 30. A.
suitable amplifier for accomplishing this rectification
comprises one amplifier section of a type 324 quad oper-
ational amplifier.
The rectified output signal from rectifier circuit 42 is
fed to signal shaping circuit 44. That is, the output of the
rectifier circuit is fed to a resistor-capacitor network.
This network comprises a ten kilohm resistor 78 cou-
pled between the output of rectifier 42 and the nonin-
verting input of an operational amplifier 80, a one mi-
crofarad capacitor 88 which couples the noninverting
input of amplifier 80 to ground, and а one hundred
kilohm resistor 86 in parallel with capacitor 88. This
network has a charging time constant of approximately
0.01 seconds and discharging time constant of approxi-
mately 0.1 seconds. Amplifier 80 may comprise one
amplifier section of a type 324 quad operational ampli-
fier and has its output coupled directly through a feed-
back loop to its noninverting input so that the amplifier
acts as a voltage follower. The output of amplifier 80
5
15
20
25
30
35
40
45
50
55
65
8
drives another resistor-capacitor network including a
five hundred kilohm resistor 82 and a ten microfarad
capacitor 90. The time constant of this latter resistor-
capacitor is approximately five seconds. Also, a diode
84, having a turn-on voltage of approximately 0.7 volts,
has its anode connected to the contact between resistor
82 and capacitor 90 and its cathode connected to the
noninverting input of amplifier 80. The positive side of
capacitor 90 is coupled through a one hundred kilohm
resistor 92 10 the output 34 of the audio channel. This
output 34 is then fed to averaging circuit 36 as explained
below. | :
For reasons explained above, signal shaping circuit 44
operates in the following manner to produce an output
on line 34 which increases at one rate with increasing
sensed ambient audio signals and which decreases at a
rate faster than said one rate with decreases in the
sensed audio signals. Furthermore, because of the de-
lays within the signal shaping circuit 44 resulting from
charging time of the resistor-capacitor networks, the
output signal on line 34 will increase at a slower rate
than the rate of increase of ambient noise signals, This
slows the rate of change of the audio subliminal signal
and thereby minimizes rapid amplitude fluctuations
therein and resulting distortions. That is, as the ampli-
tude of ambient audio signals increases, the signal reach-
ing capacitor 90 also increases. However, because of the
relatively long charging time constant of the resistor-
capacitor network including capacitor 90, capacitor 90
charges slowly. Hence, under those conditions the out-
put on line 34 comprises a slowly rising DC signal.
Furthermore, because the voltage at the anode of diode
$4 is greater than or equal to the voltage at its cathode,
diode 84 is nonconducting. In contrast, upon a sudden
decrease in the amplitude of the sensed ambient audio
signals, the input to operational amplifier 80 quickly
decreases. As a result, the voltage at the cathode of
diode 84 drops below the voltage at the anode of this
diode sufficiently to cause the diode to conduct. While
conducting, diode 84 establishes a short circuit between
the positive side of capacitor 90, through resistor 86 and
to ground so that capacitor 90 rapidly discharges.
Therefore, the output signal at 34 drops rapidly and at
a rate much faster than the rate at which the output 34
rose with increases of the amplitude of the ambient
audio signals. Of course, by adjusting the time constants
of the resistor-capacitor circuits within shaping circuit
44, the rate of change of the output 34 in response to
changes in ambient audio signals can be adjusted as
desired.
The outputs of the audio channels are fed to averag-
ing circuit 36. More specifically, resistor 92 and a simi-
lar resistor in each of the other audio channels couple
the DC outputs from these channels to the inverting
input of an operational amplifier 94 connected to aver-
age the signals received at its inverting input. Amplifier
94 may comprise a type 741 operational amplifier. The
noninverting input of this amplifier is grounded and a
twenty-five kilohm feedback resistor 96 couples the
output of amplifier 94 to its inverting input. In addition,
a ten kilohm current limiting resistor 98 couples the
output of amplifier 94, which comprises the control
signal 38, to control circuit 12. More specifically, with
this particular circuit, control signal 38 comprises a
varying direct current signal. Resistor 96 is set at one-
quarter the value of the input resistors 92 so that the
gain of the averaging amplifier 94 is established at 0.25.
In the event only one microphone is used to detect
256 / 340
268 / 570
269 / 569
4,395,600
:9
ambient audio signals, then averaging, of course, is not
performed.
Control circuit 12 controls the amplitude of the com-
posite auditory subliminal message and masking signal
received at its input 14 in response to the control signal
on line 38 and thereby in response to changes in ambient
sound levels within room 26. More specifically, the
control signal on line 38 is used as a gain control for an
amplifier 102 of circuit 39. Amplifier 102 may comrise a
type CA3080A operational transconductance amplifier
connected as a voltage controlled amplifier. The con-
troi signal on line 38 is fed to the control signal input
TABC of amplifier 102. Amplifier 102 is conducted in a
conventional manner as a single supply operational
amplifier. Also, the positive reference voltage is fed
through a voltage divider network including a forty-
seven kilohm resistor 106 and forty-seven kilohm resis-
tor 110 to ground. The three-volt signal available from
this divider is supplied to the noninverting input of
amplifier 102. A ten microfarad capacitor 108 couples
this latter input to ground to remove stray alternating
current signals at this input. In addition, the composite
subliminal auditory message signal and masking signal 1s
fed to input 14 of voltage control amplifier circuit 39..
That is, these signals are coupled through a ten micro-
farad capacitor 104 to the inverting input of amplifier
102. The output of amplifier 102 is fed to one side of a
ten kilohm potentiometer 112 having its other side cou-
pled to ground through resistor 110. The output of
circuit 39 is taken from potentiometer 112 and, as ex-
plained above, comprises a composite auditory sublimi-
nal message signal and masking signal having an ampli-
tude adjusted in response to ambient audio signals
within area 26. The wiper arm of potentiometer 112 also
‘permits adjustment of the amplitude of the voltage con-
trolled composite auditory subliminal signal and mask-
ing signal. Hence, this amplitude can be selectively
adjusted to make the masking signal component more
clearly consciously perceptible to provide an indication
that the system is operational.
Тһе gain controlled output signal of circuit 39 is
connected through a one hundred kilohm resistor 114 to
the inverting input of an operational amplifier 116
within output mixer circuit 20. Amplifier 116 may com-
prise a type 741 operational amplifier connected as an
inverting mixer. Any optional background audio sig-
nals, such as music, may be fed to input 29 of output
“mixer circuit 20. This input is coupled by a ten micro-
farad coupling capacitor 124 in series with a one hun-
dred kilohm input resistor 122 to the inverting input of
amplifier 116. A one hundred kilohm feedback resistor
is also coupled between the output of amplifier 116 and
its inverting input. Since resistors 114, 118 and 122 are
all equal, the gain of the amplifier 116 is established at
one. The output of amplifier 116 is coupled through a
ten microfarad coupling capacitor 120 to preamplifier
and amplifier circuit 22 (FIG. 1) and heuce to the
` speaker 24 located in the area 26.
In a specific anti-shoplifting application, an auditory
. subliminal message signal designed to encourage hon-
esty is provided. One such signal comprises the phrase
“Тат honest, Е will not steal". This auditory subliminal
message signal is combined with a white noise masking
signal to provide a composite signal input to the control
circuit 12. The amplitude of this composite signal is then
.' adjusted within control circuit 12, as explained above,
in response to changes іп the amplitude of ambient
-audio signals detected, within. the shopping area of а
257 / 340
—
0
20
25
30
45
55
65
10
store. The amplitude controlled composite signal is then
transmitted to the shopping area so that the subliminal
message is subconsciously perceived by individuals
within the store.
It has now been experimentally determined that, al-
though shoplifting and theft are not completely elimi-
nated, significant reductions in these losses have re-
sulted in such an application of the system of this inven-
tion.
Having illustrated and described the principles of our
invention with reference to several preferred embodi-
ments, it should be apparent to those persons skilled in
the art that such embodiments may be modified in ar-
rangement and detail without departing from such prin-
ciples. We claim as our invention all such modifications
as come within the true spirit and scope of the following
claims.
We claim:
1. An auditory subliminal message system for an area
comprising:
ambient audio stgnal processing circuit means
adapted to receive an input representing ambient
audio signals in the area, said ambient signal pro-
cessing means comprising means for producing a
control signal output which continuously varies
with variations in the received input and thereby
with variations in the ambient audio signals in the
area; and
subliminal message control circuit means having a
first input adapted to receive an auditory sublimi-
nal message signal, said control circuit means hav-
ing a second input coupled to said ambient signal
processing means for receiving said control signal
output, and said contro} circuit means comprising
means for continuously adjusting the amplitude of
the received auditory subliminal message signal
and for producing an adjusted output signal com-
prising the amplitude adjusted anditory subliminat
message signal, the adjusted output signal being
adapted for transmission to the area and having an
amplitude which varies in response to said control
signal so as to increase with increases in amplitude
of ambient audio signals in the area and decrease
with decreases in amplitude of ambient audio sig-
nals in the area. |
2. A system according to claim 1 in which said ambi-
ent audio signal processing circuit means changes said
control signal at one rate with increases in amplitude of
ambient audio signals in the area and changes it at a
faster rate with decreases in amplitude of ambient audio
signals in the area, said control circuit means compris-
ing means responsive to said control signal to produce
an adjusted auditory subliminal message output signal
which has an amplitude which increases at a first rate
with increases in the amplitude of ambient audio signals
in the area and which decreases at a second rate faster
than the first rate with decreases in the amplitude of
ambient audio signals in the area.
3. An auditory subliminal message system for an area
comprising:
audio sensor means for sensing ambient audio signals
in the area and for producing an ambient audio
output signal representing the volume of the sensed
ambient audio signals;
means having an input coupled to the output of said
audio sensor means for producing a subliminal
message output signal with a volume which fol-
269 / 570
270 / 569
4.395,600
11
lows the volume of the sensed ambient audio sig-
nals in the area.
4. A system according to claim 3 in which said last
named means includes:
subliminal message source means for providing an
auditory subliminal message output signal; and
volume control circuit means having an input cou-
pled to the output of said audio sensor means and
an input coupled to the output of said subliminal
message source means, said volume control circuit
means comprising means for adjusting the volume
of the received subliminal message output signal in
response to the received ambient audio output sig-
nal so as to produce a modified subliminal message
output signal which comprises the volume adjusted
received subliminal message output signal.
5. A system according to claim 3 in which said last
named means comprises means for producing a sublimi-
nal message output signal at a volume which increases
in response to increases in the volume of sensed ambient
audio signals at a rate slower than the rate of increase of
the sensed ambient audio signals.
6. A system according to claim 5 in which said last
named means comprises means for producing a sublimi-
па! message output signal at a volume which decreases
in response to decreases in the volume of sensed ambi-
ent audio signals at a rate which is faster than the rate
the subliminal message output signal increases in re-
sponse to increases in the volume of sensed ambient
audio signals.
7. An auditory subliminal message system for an area
comprising:
at least one audio sensor means for sensing ambient
audio signals in the area and for producing an ambi-
ent audio output signal representing the amplitude
of the sensed ambient audio signals;
subliminal message source means for providing an
auditory subliminal message output signal;
control circuit means coupled to the output of said
audio sensor means and to said subliminal message
Source means for adjusting the amplitude of the
subliminal message output signal so as to follow the
amplitude of the sensed ambient audio signals; and
masking signal source means for providing and com-
bining a masking signal having frequency charac-
teristics and an amplitude such that when the mask-
ing signal is combined with the amplitude adjusted
subliminal message output signal it renders the
adjusted subliminal message output signal outside
of the conscious recognition range. . :
8. A system according to claim 7 in which said sub-
liminal message source means comprises means for pro-
ducing a repetitive auditory subliminal message output
signal.
9. А system according to claim 7 in which said sub-
limina] message source means and said masking signal
source means comprise means for providing a compos-
ite signal which includes the auditory subliminal mes-
sage output signal as one component and which in-
cludes the masking signal as another component;
said control circuit means comprising means for ad-
justing the amplitude of the composite signal so as
to follow the amplitude of the sensed ambient audio
signals.
10. A system according to сізіп 9 including system
testing means for selectively adjusting the amplitude of
the composite signa} to bring the masking signal into the
m"
0
—
20
сә
5
40
45
55
65
5
12
conscious recognition range and thereby indicate the
system is operating.
ll. A system according to claim 7 in which said
masking signal source means provides a masking signal
having an amplitude which is in the range of approxi-
mately 3 db to 15 db greater than the amplitude of the
amplitude adjusted subliminal message output signal.
12. А system according to claim 11 in which said
masking signal source means provides a masking signal
having an amplitude which is approximately 5 db
Breater than the amplitude of the amplitude adjusted
subliminal message output signal.
13. А system according to claim 7 іп which said
masking signal source means comprises a white noise
signal generator. |
14. А system according to claim 9 in which said
means for providing a composite signal comprises an
audio recording playback means for playing back a
recording of the composite signal.
15. А system according to claim 9 in which said
means for providing a composite signal includes voice
synthesizer means for providing the auditory subliminal
signal component.
16. A system according to claim 15 in which said
means for providing a composite signal includes white
noise signal generator means for providing the masking
signal component and mixer circuit means for combin-
ing the ontput of said voice synthesizer means and the
output of said white noise signal generator means to
provide an output from said mixer circuit means which
comprises the composite signal.
17. A system according to claim 9 including output
circuit means having at least one audio speaker means
for transmitting the amplitude adjusted composite sig-
nal to the area.
18. A system according to claim 7 in which said con-
trol circuit means is also coupled to said masking signal
source means and comprises means for adjusting the
amplitude of the masking signal so as to follow the
amplitude of the sensed ambient audio signals.
19. An auditory subliminal message system for an
area comprising:
at least one audio sensor means for sensing ambient
audio signals in the area and for producing an ambi-
ent audio output signal representing the amplitude
of the sensed ambient audio signals;
subliminal message source means for providing an
auditory subliminal message output signal;
masking signal source means for providing and com-
bining a masking signal having frequency charac-
teristics and an amplitude such that when the mask-
ing signal is combined with the amplitude adjusted
subliminal message output signal it renders the
adjusted subliminal message output signal outside
of the conscious recognition range;
ambient audio signal processing circuit means cou-
pled to the output of said audio sensor means for
producing a control signal which varies with varia-
tions in the amplitude of the sensed ambient audio
signals; |
amplitude control circuit means coupled to said sub-
liminal message source means, to said masking
signal source means and to said ambient audio sig-
nal processing circuit means for controlling the
amplitude of said auditory subliminal message and
the amplitude of said masking signal in response to
the control signal from said ambient audio signal
processing circuit means such that the amplitudes
258 / 340
270 / 570
271 / 569
4,395,600
13
of said auditory subliminal signal and of said mask-
ing signal increase with increasing amplitudes of
the sensed ambient audio signals and decrease with
decreasing amplitudes of the sensed ambient audio
signals; and
output circuit means including Speaker means for
transmitting the amplitude controlled. auditory
‘subliminal message output signal and the amplitude
controlled masking signal to the area.
20. A system according to claim 19 in which said
ambient audio signal processing circuit means includes
an audio channel circuit means associated with each
said sensor means. ` |
21. A system according to claim 20 including plural
audio.sensor means and plural ‘audio channel means,
each said audio channel means including rectifier circuit
.means having an input coupled to the output of its asso-
ciated audio sensor means for receiving and producing
a rectified output signal representing the amplitude of
the ambient audio signals sensed by the associated audio
. Sensor means, each said audio channel means also in-
cluding signal shaping circuit means having an input
coupled to the output of said rectifier means for produc-
ing a shaped output signal which increases at a first rate
in response 10 increases in the rectified output signal
which corresponds to increases in the amplitude of the
ambient audio signals sensed by the associated audio
sensor means, the shaped output signal decreasing at a
second rate which is faster than the first rate in response
to decreases in the rectified output signal which corre-
sponds to decreases in the amplitude of the ambient
audio signals sensed by the associated audio sensor
means; and
said system also including averaging circuit means
having an input coupled to the outputs of said sig-
nal shaping circuit means for receiving and averag-
ing the shaped output signals to produce a control
signal comprising the average of the received
shaped output signals.
22. A system according to claim 20 including plural
audio sensor means and plural audio channel means,
each said audio channel means including rectifier circuit
means having an input coupled to the output of its asso-
ciated audio sensor means for receiving and producing
a rectified output signal representing the amplitude of
the ambient audio signals sensed by the associated audio
sensor means;
said system also including averaging circuit means
. having an input coupled to the outputs of said recti-
fier circuit means for receiving and averaging the
rectified output signals to produce an averaging
` circuit output signal comprising the average of the
received rectified output signals; and
signal shaping circuit means having an input coupled
14
increases in the amplitude of the sensed ambient
audio signals, the shaped output signal decreasing
at a second rate which is faster than the first rate in
response to decreases in the averaging circuit out-
put signal which correspond to decreases in the
amplitude of the sensed ambient audio signals.
23. A system according to claim 21 or 22 in which the
` first rate is slower than the rate of increase of the sensed
-
0
20
25
30
40
45
ambient audio signals.
24. A system according to claim 19 in which said
output circuit means includes means for combining
background audio signals, such as music, with the am-
plitude controlled auditory subliminal signal prior to
transmitting this latter signal to the area.
25. A system according to claim 21 in which the
control signal comprises a control voltage and in which
said amplitude contro] circuit means comprises a volt-
age controlled amplifier circuit.
26. A method of reducing shoplifting in a customer
area of a store comprising:
sensing ambient audio signals from the area;
providing an auditory anti-shoplifting subliminal mes-
sage signal;
adjusting the amplitude of the subliminal message
signal to follow the amplitude of the sensed audio
` signals; and
transmitting the amplitude adjusted subliminal mes-
` sage signal to the area.
27. A method according to claim 26 in which the step
of adjusting the amplitude comprises the steps of in-
creasing the amplitude at a first rate with increasing
amplitudes of the sensed audio signals and decreasing
the amplitude at a second rate faster than the first rate
with decreasing amplitudes of the sensed audio signals.
28. A method according to claim 26 or 27 including
the steps of providing a masking signal having ampli-
tude and frequency characteristics which when com-
bined with the auditory subliminal message signal ren-
ders the subliminal message signal below the level of
conscious recognition;
adjusting the amplitude of the masking signal to fol-
low the amplitude of the sensed audio signals; and
transmitting the amplitude adjusted masking signal to
the area.
29. A method according to claim 28 in which the step
of providing a subliminal message signal comprises the
step of providing a composite signal having the audi-
tory subliminal message signal as one component and
the masking signal as another component;
the step of adjusting the amplitude comprises the step
of adjusting the amplitude of the composite signal
to follow the amplitude of the sensed audio signals;
and
to the output of said averaging circuit means for 55 (һе step of transmitting comprises the step of trans-
producing a. shaped output signal which increases mitting the amplitude adjusted composite signal to
at a first rate in response to increases in the averag- the area.
ing circuit óutput signal which corresponds to к жж ж
60
65
259 / 340
271/570
U NITED STATES PATENT AND TRADEMARK OFFICE
CERTIFICATE OF CORRECTION
PATENT NO. : 4,395,600
DATED : July 26, 1983
INVENTOR(S) : Rene R. Lundy and David L. Tyler
И is certified that error appears in the above—identified patent and that said Letters Patent
are hereby corrected as shown below:
On the title page
In the References Cited:
"Relchenbach" should be --Reichenbach--.
Column 4, line 67, "is" should be --to--.
Column 9, line 9, "comrise" should be --comprise--.
Signed and Sealed this
Eighteenth Day of October 1983
[SEAL] |
Attest:
GERALD J. MOSSINGHOFF
Attesting Officer Commissioner of Patents and Trademarks
U NITED STATES PATENT AND TRADEMARK OFFICE
CERTIFICATE OF CORRECTION
PATENT NO. : 4,395,600
DATED : July 26, 1983
INVENTOR(S) : Rene R. Lundy and David L. Tyler
И is certified that error appears in the above—identified patent and that said Letters Patent
are hereby corrected as shown below:
On the title page
In the References Cited:
"Relchenbach" should be --Reichenbach--.
Column 4, line 67, "is" should be --to--.
Column 9, line 9, "comrise" should be --comprise--.
Signed and Sealed this
Eighteenth Day of October 1983
[SEAL] |
Attest:
GERALD J. MOSSINGHOFF
Attesting Officer Commissioner of Patents and Trademarks
U NITED STATES PATENT AND TRADEMARK OFFICE
CERTIFICATE OF CORRECTION
PATENT NO. : 4,395,600 `
DATED : July 26, 1983
INVENTOR(S) : Rene R. Lundy and David L. Tyler
It is certified that error appears in the above- identified patent and that said Letters Patent
are hereby corrected as shown below: |
On the titie page
In the References Cited;
"Relchenbach" should be --Reichenbach--.
Column 4, line 67, "is" should be --to--,
Column 9, line 9, "comrise" should be --comprise--.
Signed and Sealed this
Eighteenth Day of October 1983
[SEAL]
Attest:
GERALD J. MOSSINGHOFF
Attesting Officer Commissioner of Patents and Trademarks
PDF SECTION:
UNITED STATES PATENTS.
+
July 16, 1968 G. P. FLANAGAN 3,393,279
NERVOUS SYSTEM EXCITATION DZVICE
Filed March 13, 1962 | 2 Sheets-Sheet 1
POWER SUPPLY
FIG..
5
RF POWER AUDIO SOURCE OF
GENERATOR MODULATOR
AUDIO SIGNAL
` RF FREQUENCY
CONTROL
25
FIG.4.
INVENTOR
276 / 569 264 / 340 276 / 570
3,393,279
G. P. FLANAGAN
NERVOUS SYSTEM EXCITATION DEVICE
July 16, 1968
2 Sheets-Sheet š
Filed March 13, 1962
9l
61----
E 3
| x
21 е
"deaf
ua3lduv2 д-ны
GILYTINQOWN
-з9п. лану
e
!
|
!
!
L.
-------------|--------------------4
س ست س س we nae pe -=-~
VOOCOY
v
`6
--
шы
наннжо 4-8
©
|
C e69l4
possa | DOA SLE
ог QIGNY 48
е
INVENTOR
277 / 570
265 / 340
277 / 569
278 / 569
United States Patent Office
3,393,279
Patented July 16, 1968
i
3,393,270
NERVOUS SYSTEM EXCITATION DEVICE
Gillis Patrick Flanagan, Bellaire, Tex., assignor to Listen-
ing Incorporated, Arlington, Mass. a corporation of
Massachusetts
Filed Mar. 13, 1962, Ser. No. 179,337
3 Claims. (СІ. 179—107)
This invention relates to electromagnetic excitation of
the nervous system of a mammal and pertains more par-
cularly to a method and apparatus for exciting the nervous
system of a person with electromagnetic waves that are
capable of causing that person to become conscious of in-
formation conveyed by the electromagnetic waves.
Tt is an object of the present invention to provide a
means of initiating controllable responses of the neuro
senses without applying ‘pressure waves or stress waves
to the ears or bones. Another object of this invention is to
provide a means of causing a person to receive an aural
perception of the sound corresponding to the audio modu- :
lation of radio frequency electromagnetic waves that are
coupled with the nervous system of the person, These and
other objects of this invention will be understood from
the following drawings and description of the invention,
wherein:
FIGURE i is a schematic illustration of one form of
the present nervous system excitation device.
FIGURE 2 is a circuit diagram of one form of tbe
present nervous system excitation device.
FIGURE 3 is a diagrammatic view illustrating one form
of field generator adapted to be used with the device of
FIGURE 1.
FIGURE 4 is a diagrammatic view illustrating another
form of field gencrator adapted to be used with the
device of FIGURE 1.
The present invention involves the discovery that cer-
tain electromagnetic waves induce responses in the nerv-
ous systems of mammals, In human beings a response is
produced when some or all of a person’s nervous system
is placed within a field of electromagnetic waves having
a radio frequency above the audible range. In additioa,
when the nervous system of a person is contacted by
modulated electromagnetic carrier waves of such a fre-
quency, the nervous system is responsive to the modula-
tion of the carrier waves. Each individual nervous system
is at least somewhat selective in respect to the frequencies
to which it is most responsive. A frequency to which tie
nervous system of a person is demonstrably responsive can
be determined by varying the frequency of carrier waves
that are modulated by an information signal, such as
speech or music, and measuring the frequency of such
waves that produce the sensation of hearing the sounds
corresponding to the modulating signal.
In the method of the present invention, a response is
initiated in the nervous system of a mammal by dis-
posing at least a portion of that nervous system within
a field of electromagnetic waves of a radio frequency
above the aural range. In a preferred embodiment of
thís invention, the field to which the nervous system is ex-
posed is a field containing modulated electromagnetic
waves of a particular radio frequency to which the indi-
vidual nervous system is selectively responsive. In a par-
ticularly preferred embodiment of this invention, at least
a portion of the nervous system of a person is exposed to
audio modulated electromagnetic waves having a radio
fregnency such tbat the person experiences the sensation
Of hearing, substantially free of distortion, the informa-
tion which is conveyed by the audio modulation,
Тһе present invention may be used as a hearing aid, as
an aid to teaching speech to a person who was born deaf,
as a means of communicating with persons in locations
10
80
40
20
60
2
in which the noise level is hish, as а device by which a
person сап listen to an audio signal that cannot be heard
by others, etc.
As shown in FIGURE 1 of the drawing, in a preferred
form of the invention, a field of electromagnetic waves is
generated by a field generating means, such as a pair of
electrodes 1. The electrodes 1 are preferably electricaily
insulated, for example by surrounding them with a suit-
able electrical insulating material 2, and are arranged to
generate a field coupled with at least a portion of the
nervous system of a person, for example by being placed
near or along opposite sides of a person's head. The
electrodes 1 can be placed in direct contact with the skin
and the electrodes can be placed on or near various por-
tions of the body, such portions preferably being near the
spinal cord.
Тһе electrodes 1 are electrically connected to a source
of modulated electromagnetic waves inclusive of a radio
frequency power amplifier and variable frequency oscil-
lator, indicated in box 3, an audio modulator, indicated in
box 4, a source of audio signal, indicated in box 5, and а
power supply for the signal source, modulator and am-
plifier, indicated in box 6. The variable frequency oscil-
lator 3 is preferably provided with a manual radio fre-
quency control means, indicated by box За. Numerous
forms of the components, indicated in boxes 3 to 6, that
provide suitable power and a source of modulated electro-
magnctic waves are presently known and the known de-
vices can suitably be used as long as they are arranged to
produce a relatively high voltage output that has а radio
frequency above Ше audio range and is capable of being
modulated by an audio signal or other signal adapted to
be conveyed by the modulation of electromagnetic waves
of such a frequency.
The modulation can suitably be effected by means of
either an amplitude or frequency modulation of such
electromagnetic waves. These waves preferably have a
frequency in the range of from about 20 kilocycles per
second to about 200 kilocycles per second. The output of
the source of modulated electromagnetic waves is prefer-
ably at least about 1 watt where the field generator com-
prises a pair of insulated electrodes placed on the head
of a person. The extent to which a person is aurally per-
ceptive to the output supplied at a given wattage is ma-
terially increased when at least one of the electrodes is
placed in electrical contact with the body of the person.
In a preferred mode of operating the apparatus shown
in FIGURE 1, the electrodes 1 are placed on the sides of
the head of a person. The source 5 of audio signal is
actuated to produce an audio signa! corresponding to
sounds recognizable by that person, and source 3 of
modulated electromagnetic waves is actuated to couple
the waves with the nervous system of that person. When
control ЗА is adjusted so that the frequency of the modu-
lated waves is a frequency to which his nervous system is
particularly responsive, the person to whom the field of
such waves is applied has the sensation of hearing the
sounds corresponding to the audio signal substantially
free of distortion.
In the circuit shown in FIGURE 2, a phase shift type
of carrier oscillator, generally designated by dotted rec-
tangle 7, with a frequency control. generalty designated
by rectangle $8, is arranged to produce electromagnetic
waves, shown at А, a frequency ranging from about
20 to about 200 kilocycles per second. The oscillator out-
put is coupled through capacitor 9 to a radio frequency
power amplifier, generally designated by dotted rectangle
10. Potentiometer 11, which is connectcd between capaci-
tor 9 and ground, provides a means of adjusting the input
То the amplifier, Switch 12, which is coanected to the
cathode of tube 13 of the amplifier, provides a means
266 / 340
279 / 569
3,393,279
of switching between resistors 14 and 15 to vary the oper-
ating power characteristics of the tube.
The output of amplifier 10 is connected to transformer
16 which is coupled back-to-back with transformer 17.
This arrangement of transformers provides an Inductive
load such that the amplifier yields a high voltage output
and is isolated from other components of the circuit. Re-
sistor 18 connected across Ше output side of transformer
17 serves to reduce any dangerous voltage spikes which
might be produced. The output side of transformer 17
is connected to a suitable field generator, which may com-
prise the electrodes 1 surrounded by insulating mate-
rial 2.
The output of amplifier 10 is ampltiude modulated by
means of the modulator generally designated by dotted
rectangle 19. А fluctuating clectrical signal B, ргейег-
ably of audio frequency, is applied to the modulator by
means of input jack 20 and transformer 21. The output
of the modulator varies the screen voltage of tube 13
of the amplifier so that the modulation envelope of the ;
current oscillation C produced across the load of tube 13
correspond to the fluctuating signal B applied to the
moduator. |
Potentiometer 22 is connected to the cathode of tube
23 as the cathode resistor of tube 23. Potentiometer 22
is preferably adjusted so that the plate current of tube
13 is about half its normal maximum value. The fluctu-
ating signal applied to modulator 19 is then adjusted to
cause the plate current of tube 13 to vary between the
maximum and minimum values so that a large current
variation occurs іп the load 16 of tube 13.
Тһе apparatus shown iu FIGURE 2 has been used to
communicate speech and music to numerous persons in-
cluding registered physicians. In these uses the electrodes
1, in the form o£ circular disc covered by a plastic insula-
tion 2, were placed against the sides of the heads of the
persons. When the electromaguctic waves were adjusted
to a frequency to which persons having normal hearing
were selectively responsive, none of these persons per-
ceived any sensations of hearing or experienced any dis-
combort when no audio modulatiou was applied to the
waves. When the waves were audio modulated with a
speech or music signal, none of these persons experienced
any discomfort, but they each had the sensation of listen-
ing to the transmitted information and “hearing” it at
least as clearly as they would hear such information from
an audible transmitter. When the same apparatus was
similarly employed on a person whose hearing had been
damaged to an extent requiring a hearing aid to hear
normal conversation, that person “heard” the audio sig-
nal (with this hearing aid disconnected) and “heard”
music with a better fidelity than that obtainable with his
hearing aid. |
FIGURE 3 shows an arrangement for mounting the
field generating means in a position such that a portion
of a person's nervous system may be moved into and
out of coupling with the field at the will of the person.
In this arrangement, electrodes 1 surrounded by insula-
tion 2 are mounted in vertical alignment along the back
of a seating device, such as chair 24. When a person is
seated and leaning back in the chair, portions of his
nervous system are brought into coupling relationship
with the field produced by electrodes 1.
FIGURE 4 shows an alternative arrangement of the
‘field generating means. In this arrangement, inductive
сой 25 is connected to the output of a suitable source
of modulated electromagnetic waves and serves as a field
10
30
35
40
50
55
60
267 / 340
4
generating means which is adapted to be placed around
the head of a person.
It is to be understood that the above embodiments -and
examples have been presented for descriptive purposes
and that, within the scope of the appended claims, the
invention may be practiced otherwise than specifically
illustrated and described. |
I claim:
1. A method of transmitting audio information to the
brain of a subject through the ncrvous system of the
subject which method comprises, in combination, the steps
of generating a radio frequency signal having a frequency
in excess of Ше highest frequency of the audio informa-
tion to be transmitted, modualting said radio frequency
signal with the audio information to be transmitted, and
applying said modulated radio frequency signal to a pair
of insulated electrodes and placing both of said insulated
electrode in physical contact with the skin of said sub-
ject, the strength of said radio frequency electromagnetic
field being high enough at the skin surface to cause the
sensation of hearing the audio information modulated
thereon in the brain of said subject and low enough so
that said subject experiences no physical discomfort.
2. The method of claim 1 wherein said modulated elec-
tromagnetic field is coupled with a portion of the nervous
system contained in the person’s spinal column.
3. Apparatus for transmitting audio information to the
brain of a subject through the nervous system of the sub-
ject comprising, in combination, means for generating a
radio frequency signal having a frequency greater than
the maximum frequency of said audio information, means
for modulating said radio frequency signal with the audio
information to be transmitted, electrode means adapted
to generate a localized radio frequency electromagnetic
field thereabout when excited by a radio frequency signal,
and means coupling said modulated radio frequency sig-
nal to said electrode means, said electrode means hav-
ing a surface adapted to be capacitively coupled to a
localized area at the surface of the skin of said subject
when placed in physical contact therewith whereby said
electrode means may generate a localized radio frequency
electromagnetic ficld modulated by said audio informa-
tion at the surface of the skin of said subject, and means
on said surface of said electrode means for insulating
said electrode means from the skin of said subject.
References Cited
UNITED STATES PATENTS
3,170,993 2/1965 Puharich ct а. ----- 179--107
1,001,236 8/1911 Bachelet .-_..--------- 128—1.5
1,120,964 12/1914 Neel --------------- 128—1.5
2,004,751 6/1935 Fischer -------- 128—423 X
2,103,440 12/1937 Weissenberg --------- 128—1.3
2,118,594 5/1938 Dowden ---------- 128—1.5 X
2,438,605 3/1948 Hart .-.-.-------- 128—1.5. X
2,713,120 7/1955 Mostofsky .....-.. 128—423 X
1,735,267 11/1929 Eichhorn ----------- 179—107
2,995,633 8/1961 Puhdrich __ _. 179—107
OTHER REFERENCES
Rutschmann, pp. 22, 23, IRE Transactions оп Med.
Electronics, March 1959, |
KATHLEEN Н. CLAFFY, Primary Examiner.
ROBERT H. ROSE, Examiner. .
1. W. JOHNSON, A. A. MCGILL, Assistant Examiners.
279 / 570
PDF SECTION:
UNITED STATES PATENTS.
E
281 / 569
United States Patent по
Malech
ин 3,951,134
[45] Apr. 20, 1976
(54] APPARATUS AND METHOD FOR
REMOTELY MONITORING AND
ALTERING BRAIN WAVES
[75] Inventor: Robert С. Malech, Plainview, N.Y.
(731. Assignee: Dorne & Margolin Inc., Bohemia,
N.Y.
[22] Filed: Aug. 5, 1974
[21] Appl. №.: 494,518
[52] 128/2.1 B
[51] Int. Chee ec AGIB 5/04
[58] Field of Search ................. 128/1 C, 1 R, 2.1 B,
128/2.1 R, 419 R, 422 R, 420, 404, 2 R, 2 S,
2.05 R, 2.05 V, 2.05 F, 2.06 R; 340/248 A,
258 A, 258 B, 258 D, 229
3,555,529 1/1971 Brown et А|...................... 128/2.1 R
3,773,049 11/1973 Rabichev et al. нн 128/1 С
3,796,208 3/1974 — BiOICO octets teres 128/2 8
Primary Examiner—William E. Kamm
Attorney, Agent, or Firm—Darby & Darby
[57] ABSTRACT
Apparatus for and metbod of sensing brain waves at a
position remote from a subject whereby electromag-
netic signals of different frequencies are simulta-
neously transmitted to the brain of the subject in
which the signals interfere with one another to yield a
waveform which is modulated by the subject’s brain
waves. The interference waveform which is represen-
tative of the brain wave activity is re-transmitted by
the brain to a receiver where it is demodulated and
amplified. The demodulated waveform is then dis-
[56] References Cited played for visual viewing and routed to a computer for
UNITED STATES PATENTS further processing and analysis. The demodulated.
2,860,627 11/1958 Harden et ab ................... 128/2.1 В Waveform also can be used to produce a compensating
3,096,768 7/1963 Griffith, 2.22.2... 128/420 Signal which is transmitted back to the brain to effect
3,233,450 2/1966 Ету................ ess. 128/2.1 А a desired change in electrical activity therein,
3,483,860 12/1969 Namerow..... сем. 128/2.05 Е . e
3,495,596 2/1970 Сопана.............................. 1281 C 11 Claims, 2 Drawing Figures
48 50а 58а
T 46 PLOTTER
е 50b 58b
Ë 70
Soc |
2 %
BAND pass [^7 2 | :
FILTER е4
62 AUXILIARY
C
30 34 с
38 CIRCULATOR Ер
45 10
RE
POWER
DIVIDER
39
FREQUENCY
DOUBLER
36
. 4l
Би],
269 / 340
281 / 570
3,951,134
Sheet 1 of 2
U.S. Patent April 20, 1976
| USLLIWSNV YL
АЯУІЛІХАУ
(ногулпаон
30193434
59110319313
VNN3.INV
:81
b VNN31NV 21
JYALLINSNVYL
| 914
на: пайоо
g3dana
го
КЕШЕН:
AV 13S1g
|
|
|
|
1
|
>|
|
t
|
І
|
|
і
|
і
|
3,951,134
26-4 uo1v1112s0 |
283 / 570
April 20, 1976 Sheet 2 of 2
U.S. Patent
9ç
излапоа
қ AON3ñn0334
i 6€
— 2 yaaiald |
C. Mod 80497111260
Ol Sb У
99 YOLVINIID ВЕ рс ос
M31 HIASNYML
Анугихпу
v9 331114
2p] 8598 ONYE
ua3indwWoo
оо ГЕЛІ? | ш
915 GLS ?08
OL
mE E aonad
406
авс, | pt
ма зол 9v
asia | < 2 94
DEG POS Gt
271 / 340
283 / 569
284 / 569
3,951,134
i
APPARATUS AND METHOD FOR REMOTELY
MONITORING AND ALTERING BRAIN WAVES
BACKGROUND OF THE INVENTION
Medical science has found brain waves to be a useful
barometer of organic functions. Measurements of elec-
trical activity in the brain have been instrumental in
détecting physical and psychic disorder, measuring
stress, determining sleep patterns, and monitoring body:
metabolism.
The present art for measurement of brain waves em-
ploys electroencephalographs including probes with
sensors which arc attached to the skull of the subject
under study at points proximate to the regions of the
brain being monitored. Electrical contact between the
sensors and apparatus employed to process thc de-
tected brain waves is maintained by a plurality of wires
extending from the sensors to the apparatus. The ne-
cessity for physically attaching the measuring appara-
tus to the subject imposes scveral limitations on the
measurement process. The subject may experience
discomfort, particulary if the measurements. are to be
made over extended periods of time. His bodily move-
ments are restricted and he is generally confined to the
immediate vicinity of the measuring apparatus. Fur-
thermore, measurements cannot be made while the
subject is conscious without his awareness. The com-
prehensiveness of the measurements is also limited
since the finite number of probes employed to monitor
local regions of brain wave activity do not permit ob-
servation of the total brain wave profile i in a single test.
SUMMARY OF THE INVENTION
The present invention relates to apparatus and a
method for monitoring brain waves wherein all compo-
nents of the apparatus employed are remote from the
test subject. More specifically, high frequency trans-
mitters are operated to radiate electromagnetic energy
of different frequencies through antennas which are
capable of scanning thc entire brain of the test subject
or any desired region thereof. The signals of different
frequencies penetrate thc skull of the subject and im-
pinge upon the brain where they mix to yield an inter-
ference wave modulated by radiations from the brain's
natural electrical activity. The modulated interference
wave is re-transmitted by the brain and reccived by an
antenna at a remote station where it is demodulated,
and processed to provide a profile of the suject's brain
waves. In addition to passively monitoring his brain
waves, the subject's neurological processes may be
affected by transmitting to his brain, through a trans-
mitter, compensating signals. The latter signals can be
derived from the received and processed brain waves.
OBJECTS OF THE INVENTION
It is therefore an object of the invention to remotely
monitor electrical activity in the entire brain or se-
lected local regions thereof with a single measurement.
Another object is the monitoring of a subject's brain
wave activity through transmission and reception of
electromagnetic waves.
Still another object is to monitor brain wave activity
from a position remote from the subject.
А further object is to provide a method and appara-
tus for affecting brain wave activity by transmitting
electromagnetic signals thereto.
272 / 340
10
i5
20
25
30
35
40
45
50
55
60
65
' tronic form is stored in buffer circuitry 22. From the
2
DESCRIPTION OF THE DRAWINGS
Other ала further objects of the invention will appear
from the following description and the accompanying
drawings, which form part of the instant specification
and which are to bc read in conjunction therewith, and
in which like reference numerals arc uscd to indicate
like parts in the various views;
FIG. 1 is a block diagram showing the interconnec-
tion of the components of the apparatus of the inven-
tion;
FIG. 2 is a block diagram showing signal flow in one
embodiment of the apparatus.
DESCRIPTION OF THE PREFERRED
EMBODIMENT
Referring to the drawings, specifically FIG. 1, a high
frequency transmitter 2 produces and supplies two
electromagnetic wave signals through suitable coupling
means 14 to an antenna 4. The signals arc directed by
the antenna 4 to the skull 6 of the subject 8 being exam-
ined. Tbe two signals from the antenna 4, which travel
independently, penetrate the skull 6 and impinge upon
the tissue of the brain 10.
Within the tissue of thc brain 10, the signals combine,
much in the manner of a conventional mixing process
technique, with each section of the brain having a dif-
ferent modulating action. The resulting waveform of
the two signals has its greatest amplitude when the two
signals are in phase and thus rcinforcing one another.
When the signals are exactly 180? out of phase the
combination produces a resuitant waveform of mini-
mum amplitude. If the amplitudes of the two signals
transmitted to the subject are maintained at identical
levels, the resultant interference wavcform, absent
influences of external radiation, may be expected to
assume zero intensity when maximum interference
occurs, the nurober of such póints being equal to the
difference in frequencies of the incident signals. How-
ever, interfcrence by radiation from electrical activity
within the brain 10 causes the waveform resulting from
interference of the two transmitted signals to vary from
the expected result, 1.е., the interference waveform is
modulated by the brain waves. It is believed that this is
due to the fact that brain waves produce electric
charges each of which has a component of electromag-
netic radiation associated with it. Thc electromagnetic
radiation produced by the brain waves in turn reacts
with the signals transmitted to the brain from the exter-
nal source.
Тһе modulated interference waveform is rc-transmit-
ted from the brain 10, back through the skull 6. A
quantity of energy is re-transmitted sufficient to enable
it to be picked up by thc antenna 4. This can be con-
trolled, within limits, by adjusting the absolute and
relative intensities of the signals, originally transmitted
to the brain. Of course, the lével of the transmitted
energy should be kept below that which may be harm-
ful to the subject.
The antenna passes the received signal to a receiver
12 through the antenna electronics 14. Within the ге-
ссіуег the wave is amplified by conventional RF ampli-
fiers 16 and demodulated by conventional detector and
modulator electronics 18. The demodulated wave, rep-
resenting the intra-brain electrical activity, is amplified
by amplifiers 20 and the resulting information in elec-
buffers 22 the information is fed to a suitable visual
284 / 570
285
3,951,134
3
display 24, for example one employing a cathode ray
tube, light emitting diodes, liquid crystals, or a mechan-
ical plotter. The information may also be channeled to
a computer 26 for further processing and analysis with
the output of the computer displayed by herctofore
mentioned suitable mcans. -
In addition to channeling its information to display
devices 24, the computer 26 can also produce signals to
control an auxiliary transmitter 28. Transmitter 28 is
used to producc a compensating signal which is trans-
mitted to the brain 10 of the subject 8 by the antenna
4. In а preferred embodiment of the invention, the
compensating signal is derived as a function of the
received brain wave signals, although it can be pro-
duced separately. The compensating signals affect elec-
trical activity within the brain 10.
Various configurations of suitable apparatus and
electronic circuitry may be utilized to form the system
generally shown in FIG. 1 and onc of the many possible
configurations is illustrated in FIG. 2. In the example
shown therein, two signals, one of 100 MHz and thc
other of 210 MHz are transmitted simultaneously and
combine in the brain 10 to form a resultant wave of
frequency equal to the difference in frequencies of the
incident signals, i.e., 110 MHz. The sum of the two
incident frequencies is also available, but is discarded
in subsequent filtering. The 100 MHz signal is obtained
at the output 37 of an RF power divider 34 into which
а 100 MHz signal generated by an oscillator 30 is in-
Jected. The oscillator 30 is of a conventional type em-
ploying either crystals for fixed frequency circuits or a
tunable circuit set to oscillate at 100 MHz. It can be a
pulse generator, square wave generator or sinusoidal
wave gencrator. The RF power divider can be any
conventional VHF, UHF or SHF frequency range de-
vice constructed to provide, at each of three outputs, a
signal identical in frequency to that applied to its input.
The 210 MHz signal is derived from the same 100
MHz oscillator 30 and RF power divider 34 as the 100
MHz signal, operating in concert with a frequency
doubler 36 and 10 MHz oscillator 32. The frequency
doubler can be any conventional device which provides
at its output a signal with frequency equal to twice the
frequency of a signal applied at its input. The 10 MHz
oscillator can also be of conventional type similar to
the 100 MHz oscillator herebefore described. А 100
MHz signal from the output 39 of the RF power divider
34 is fed througb the frequency doubler 36 and the
resulting 200 MHz signal is applied to a mixer 40. The
mixer 40 can be any conventional VHF, UHF or SHF
frequency range device capable of accepting two input
signals of differing frequencies and providing two out-
put signals with freguencies equal to the sum and dif-
ference in frequencies respectively of the input signals.
А 10 MHz signal from the oscillator 32 is also applied
to the mixer 40. The 200 MHz signal from the doubier
36 and the 10 MHz signal from thc oscillator 32 com-
bine in the mixer 40 to form a signal with a frequency
of 210 MHz equal to the sum of the frequencics of the
200 MHz and 10 MHz signals.
The 210 MHz signal is one of the signals transmitted
to the brain 10 of the subject being monitored. In the
arrangement shown in FIG. 2, an antenna 41 is used to
transmit the 210 MHz signal and another antenna 43 is
used to transmit thc 100 MHz signal. Of course, a single
antenna capable of operating at 100 MHz and 210
MHz frequencies may be used to transmit both signals.
The scan angle, direction and rate may be controlled
10
25
30
35
40
45
50
55
60
65
4
mechanically, e.g., by a reversing motor, or electroni-
cally, e.g., by energizing elements in the antenna in
proper synchronization. Thus, thc antenna(s) can be of
either fixed or rotary conventional typcs.
A second 100 MHz signal derived from output termi-
nal 37 of the three-way power divider 34 is applied to
a circulator 38 and emerges therefrom with a desired
phase shift. The circulator 38 can be of any conven-
tional type wherein a signal applied to an input port
emerges from an output port with an appropriate phase
shift. The 100 MHz signal is then transmitted to the
brain 10 of the subiect being monitored via the antenna
43 as the second component of the dual signal trans-
mission. The antenna 43 can be of conventional type
similar to antenna 41 herebefore described. As previ-
ously noted, these two antennas may be combined in a
single unit.
The transmitted 100 and 210 MHz signal compo-
nents mix within thc tissue in the brain 10 and interfere
with one another yielding a signal of a frequency of 110
MHZ, the difference in frequencies of the two incident
components, modulated by electromagnetic emissions
from the brain, i.e., the brain wave activity being moni-
tored. This modulated 110 MHz signal is radiated into
Space.
The 110 MHz signal, modulated by brain wave activ-
ity, is picked up by an antenna 45 and channeled back
through the circulator 38 where it undergoes an appro-
priate phase shift. The circulator 38 isolates the trans-
mitted signals from the received signal. Any suitable
diplexer or duplexer can be used. The antenna 45 can
be of conventional type similar to antennas 41 and 43.
It can be combined with them in a single unit or it can
be separate. The reccived modulated 1 10 MHz signal is
then applied to а band pass filter 42, to eliminate unde-
sirable harmonics and extraneous noise, and the fil-
tered 110 MHz signal is inserted into a mixer 44 into
which has also been introduced a component of the
100 MHz signal from the source 30 distributed by the
RF power divider 34. The filter 42 can be any conven-
Попа! band pass filter. The mixer 44 may also be of
conventional type similar to thc mixer 40 herebefore
described,
The 100 MHz and 110.MHz signals combine in the
mixer 44 to yield a signal of frequency equal to the
difference in frequencies of the two component signals,
i.e., 10 MHz still modulated by the monitored brain
wave activity. The 10 MHz signal is amplified in an IF
amplifier 46 and channeled to a demodulator 48. The
IF amplifier and demodulator 48 can both be of con-
ventional types. The type of demodulator selected will
depend on the characteristics of the signals transmitted
to and received from the brain, and the information
desired to be obtained. The brain may modulate the
amplitude, frequency and/or phase of the interference
waveform. Certain of these parameters will be more
sensitive to corresponding brain wave characteristics
than others. Selection of amplitude, frequency or phase
demodulation means is governed by the choice of brain
wave characteristic to be monitored. If desired, зсуста!
different types of demodulators can be provided and
used alternately or at the same time.
The demodulated signal which is representative of
the. monitored. brain wave activity is passed through
audio amplifiers 50 a, b, c which may be of convcn-
tional type where it is amplified and routed to displays
58 a, b, c and a computer 60. The displays 58 a, b, с
present the raw brain wave signals from the amplifiers
286 / 569
3,951,134
5
50 a, b, c. The computer 60 processes. the amplifi ied -—
brain-wave signals to derive information suitable for
viewing, e.g., by suppressing, compressing, or expand-
ing elements thercof, or combining them with other
information-bearing signals and presents that informa- `
tion on a display 62, The displays can be conventional
ones such as the types herebefore mentioned employ-
ing electronic visual displays or mechanical plotters
S8b. The computer can also be of conventiona! type,
either analog or digital, or a hybrid.
А profile of the entire brain wave emission pattern
may be monitored or select areas of the brain may be
observed in a single measurement simply by altering
the scan angle and direction of the antennas. There is
no physical contact between the subject and the moni-
toring apparatus. The computer 60 also can determine
a compensating waveform for transmission to the brain
10 to alter the natural brain waves in a desired fashion.
The closed loop compensating system permits instanta-
ncous and continuous modification of the brain wave
Tesponse pattern.
In performing the brain wave pattern modification
function, the computer 60 can be furnished with an
external standard signal from a source 70 representa-
tive of brain wave activity associated with a desired
nuerological response. The region of the brain respon-
sible for the response is monitored and the received
signal, indicative of the brain wave activity therein, is
compared with the standard signal. The computer 60 is
programmed to determine a compensating signal, re-
sponsive to the difference between the standard signal
and received signal. The compensating signal, when
transmitted to the monitored region of the brain, mod-
ulates the natural brain wave activity therein toward a
reproduction of the standard signal, thereby changing
the neurological response óf the subject.
The computer 60 controls an auxiliary transmitter 64
which transmits the compensating signal to the brain 10
of the subject via an antenna 66. The transmitter 64 is
of the high frequency type commonly used in radar
applications. Thc antenna 66 can be similar to antennas
41, 43 and 45 and can be combined with them.
Through these means, brain wave activity may be al-
tered and deviations from a desired norm may be com-
pensated. Brain waves may be monitored and control
signals transmitted to the brain from a remote station.
It is to be noted that the configuration described is
onc of many possibilities which may be formulated
without departing from the spirit of my invention. The
transmitters can be monostratic or bistatic. They also
сап be single, dual, or multiple frequency devices. The
transmitted signal can be continuous wave, pulse, FM,
or any combination of these as well as other transmis-
sion forms. Typical operating frequencies for the trans-
mitters range from 1 MHz to 40 GHz but may be al-
tered to suit the particular function being monitored
and the characteristics of the specific subject.
The individual components of the system for moni-
toring and controlling brain wave activity may be of
conventionai type commonly employed in radar sys-
tems.
Various subassemblies of thc brain wave monitoring
and control apparatus may be added, substituted or
combined. Thus, separatc antennas or a single multi-
mode antenna may be used for transmission and recep-
поп. Additional displays and computers may Бе added
to present and analyze select components of the moni-
tored brain waves.
20
25
35
40
45
50
55
60
65
274 / 340
Modulation of the interference signal retransmitted
by the brain may be of amplitude, frequency and/or
phasc. Appropriate demodulators may be used to deci-
pher the subject's brain activity and select components
of his brain waves may be analyzed by computer to
determine his mental state and monitor his thought
processes.
As will be безе by those familiar with the. art,
apparatus and method of the subject: invention has
numerous uscs. Persons in critical positions such as
drivers and pilots can be continuously monitored with
provision for activation of an emergency device in the
event of human failure. Seizures, sleepiness and dream-
ing can be detected. Bodily functions such as pulse
rate, heartbeat reqularity and others also can be moni-
tored and occurrences of hallucinations can be de-
tected. The system also permits medical diagnoses of
patients, inaccessible to physicians, from remote sta-
tions.
What is claimed is:
1. Brain wave monitoring apparatus comprising
means for producing a base frequency signal,
means for producing a first signal having a frequency
related to that of the base frequency and at a pre-
determined phasc related thereto,
means for transmitting both said base frequency and
said first signals to the brain of the subject being
monitored,
means for receiving a second signal transmitted by
the brain of the subject being monitored in те-
sponse to both said base frequency and said first
signals,
mixing means for producing from said base fre-
quency signal and said received second signal a
responsc signal having a frequency related to that
of the base frequency, and
means for interpreting said response signal.
2. Apparatus as in claim 1 where said receiving
means comprises
means for isolating the transmitted signals from the
received second signals.
3. Apparatus as in claim 2 further comprising a band
pass filter with an input connected to said isolating
means and an output connected to said mixing means.
4. Apparatus as in claim 1 further comprising means
for amplifying said responsc signal.
5. Apparatus as in claim 4 further comprising means
for demodulating said amplified response signal.
6. Apparatus as in claim 5 further comprising inter-
preting means connected to the output of said demodu-
lator means.
7. Apparatus according to claim Е further comprising
means for producing an electromagnetic wave con-
trol signal dependent оп said response signal, and
means for transmitting said control signal to the brain
of said subject.
8. Apparatus as in claim 7 wherein said transmitting
means comprises means for directing the electromag-
пейс wave control signal to a predetermined part of the
brain.
9. A process for monitoring brain wave activity of a
subject comprising the steps of
transmitting at lcast two electromagnetic energy sig-
nals of different frequencics to the brain of the
subject being monitored,
receiving an electromagnetic energy signal resulting
from the mixing of said two signals in the brain
modulated by the brain wave activity and retrans-
—— —2867 570
287
3,951,134
7
mitted by the brain in response to said transmitted
energy signals, and, |
interpreting said received signal.
10. A process as in claim 9 further comprising thc
step of transmitting a further electromagnetic wave
signal to the brain to vary the brain wave activity.
11. A process as in claim 10 wherein the step of
transmitting the further signals comprises
obtaining a standard signal,
5
10
20
25
30
35
40
45
50
55
60
65
8
. comparing said recéived' electromagnétic energy sig-
nals with said standard signal,
producing a compensating signal corresponding to
the comparison between said received electrogag-
netic energy signals and the standard signal, and
transmitting the compensating signals to the brain of
the subject being monitored.
ж ж ж ж ж
; ' Mengerikan! Senjata Fiksi-ll. i
Active Denial System Non-lethal weapons capabil... g ) Test results show Active De...
US Military UNMANNED TR... The Active Denial System (A... US military ADS Active Deni... Active Denial System: a tera...
—-— —
Ready, Aim, Fire: Hypersoni...
E
High-Power Microwave Dire.
How about that?
288 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
289 / 569 289 / 570
«СО.
291 / 569 278 / 340 291 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
295 / 569 295 / 570
ж и лүү %
р پک "
1 КЕ E
га
1
\ -—
4
4 292 / 570
TOP SECRET.
Мина Jf AIRPORT
TOWER.
E |
FLIGHT CONTROL.
| | l Lett =
i 1 ' |
NOT ONLY AT AIRPORTS. |
WE FIND THEM ON ROOFTOPS. = >
Cm * е н |
Dependent Multi-Lateration ooperative &
(ADS-B Radio Stations) | Independents) O =
7 رور
:280 / 340
= —F lll aa — — -
T
о
Мә]
[Тә]
—
Мә]
о
N
«СО.
297 / 569 281 / 340 297 / 570
EMWatch.com - EMF Guidelines
EMF Guidelines for Radio Frequency
and Low Frequency Electromagnetic
Radiation
In which the health risk of various levels
of EMF exposure are compared
EMF Guidelines v1.3 Copyright www.emwatch.com
а ——
298 / 569 282 / 340 298 / 570
EMWatch.com - EMF Guidelines
Contents
EMF Guidelines Page 3
Notes on EMF Guidelines Page 4
Notes on Appendix 1 and Appendix 2 Page 8
Appendix 1 - Radio-Frequency EMF Limits Page 9
Appendix 2 — Low-Frequency EMF Limits Page 10
e
299 / 569 283 / 0 299/570
EMWatch.com - EMF Guidelines
EM Watch Electromagnetic Radiation Exposure Guidelines Copyright: www.emwatch.com
Radio-Frequency Radiation Guidelines - for continuous and prolonged exposure
: m Microwatts per
Risk Level | Millivolts per Metre | Square meter
2 10.0- 100 0.1-26.5
Description
Slight risk of serious health effects, especially for
children / pregnant women
8 100 — 650 26.5 — 1120 Moderate risk of serious health effects
Low Frequency Electromagnetic Radiation Guidelines - for continuous and prolonged exposure
Risk Level Milligauss MicroTesla Description
2 10-20 04-02 Slight risk of serious health effects, especially for
children / pregnant women
3 2.0 — 5.0 0.2-0.5 Moderate risk of serious health effects
Continuous and prolonged exposure means exposure for several hours a day, for several months - or years.
Notes
1. Electro-Hypersensitive people may experience discomfort at very low EMF levels (even at Risk
Level 1).
2. Pregnant women should spend most of their time in level 1, but brief visits to levels 2 and 3 will
probably do no harm. Avoid level 4.
3. Children should spend most of their time in level 1. Short periods of time may be spent in levels 2, 3
and 4.
4. Everyone should avoid continuous prolonged exposure at level 4.
5. Bedrooms, schools, hospitals, libraries and workplaces should be at level 1.
Use with discretion, and at your own risk. Bear in mind that no level of EMF has been proved absolutely
safe (except zero).
للل و
300 / 569 284 / 0 300 / 570
EMWatch.com - EMF Guidelines
Two Kinds of Electromagnetic Radiation
There are two kinds of man-made EMF (ElectroMagnetic Field) which are believed to be damaging to our
health, and which are common in our homes and workplaces.
One kind is called low-frequency EMF, which is emitted from all mains electrical devices, power lines and
house wiring, electric motors and some electronic devices.
The other kind is radio-frequency EMF which is emitted from all radio transmitters, cordless phones, cell
phones, cell towers, wi-fi systems, and wireless communications devices.
The two kinds have different qualities. They are measured differently, and the measurements are expressed
In different units. That is why the EMF Guidelines on Page 1 above contain two separate sections.
They are both important, because each can affect your health.
This document deals with these two kinds of radiation only.
What About Short-Term Radiation Exposure?
The above guidelines are for long-term EMF exposure. That generally means several hours a day for years -
but at the very least, months.
What about occasional short-term exposure? If your exposure is limited to a few hours, or days at most, you
are unlikely to suffer long-term health consequences, even if exposed to very high levels of radiation (but
rather avoid it if you can!)
The exception to this is pregnant women, and possibly very young children. They should avoid high levels of
radiation, even for short periods.
How Much Electromagnetic Radiation is Safe?
Sooner or later, in your quest to understand the effects of electromagnetic radiation, you will probably want to
understand the numbers.
You may start to ask questions like “How much radiation is in my home right now?"
Suppose you invited me into your house for a cup of tea or coffee, and you asked me to bring along my EMF
meter. Walking around your lounge, holding a radio-frequency ЕМЕ meter in my hand, | notice that the
readings around the room are between 40-100 mV/m , except over by the window, where the level is
fluctuating around 250-350 mV/m (millivolts per metre).
So is that too high? Should you be concerned?
To find the answer, refer to our Guidelines (Page 3). You would see that the level of 40 to 100 mV/m spans
the Low Risk and Moderate Risk levels, and that 250 — 350 mV/m spans the Moderate Risk and High Risk
levels.
We could take similar measurements in your whole house. So now you would have a much better idea of
how much risk you are running, and where the "hotspots" are. The meter tells you the numbers.
ل و
301 / 569 285 / 0 301 / 570
EMWatch.com - EMF Guidelines
The EMF Guidelines tell you how much risk you are running. And from that information, you can decide what
action, if any, you want to take to reduce your exposure.
How Reliable are the Guidelines?
There is no consensus among scientists as to what level of radiation creates a health risk in the population.
Literally thousands of studies have been performed. This means that you can probably find studies to support
your viewpoint, no matter what your viewpoint is.
Companies who make profits from devices which generate electromagnetic radiation generally still take the
view that there is insufficient evidence of any health risk. They, too can find studies to support this view.
(Often, these are studies devised and funded by those companies!)
However, most of the independent studies have found a relationship between high radiation levels and
increased health risks. Using the results of these studies, it is possible to deduce the EMF exposure level
which caused (or at least was associated with) an increase in the incidence of a particular disease.
Many international bodies, governments and medical institutes have used this information to set legal limits
or maximum exposure guidelines. (Over time, these limits may tend to move downwards, as increasing
evidence is found of health effects.)
Even the World Health Organization has recently acknowledged that electromagnetic radiation might cause
serious diseases, such as cancer.
But legal limits in the USA (and some other countries) have not been reduced from the very high levels which
were set decades ago by the International Commission on Non-lonising Radiation Protection (ICNIRP).
EM Watch has looked into the limits in force in various parts of the world and the recommendations of
various expert bodies, and has used this information to compile these EMF Guidelines.
How Much Radiation is Too Much for You?
It appears from scientific research that no level of electromagnetic radiation (low-frequency or radio-
frequency) is completely safe. Even low levels may cause biological damage.
But the body has some ability to repair EMF damage. So if the amount of EMF you are receiving is within
your repair capacity, no long-term damage is done. (Of course, the energy used to effect the repair could
have been used by your body for some other useful purpose.)
Generally speaking, the level of radiation which will affect your health depends on how much time you are
exposed to it.
But another factor is who you are and your state of health. A young, healthy adult can handle more EMF
than a child or an older person, or a sick person.
That is why any EMF guideline can only give an indication of the risks for the average person. Bear in mind,
you may not be average!
— — s للل
302 / 569 286 / 340 302 / 570
EMWatch.com - EMF Guidelines
Pregnancy
Pregnant women have to be particularly careful because the foetus is very vulnerable.
There is evidence that high levels of electromagnetic radiation can cause miscarriage. Also, it appears that
EMF exposure in the womb can cause the unborn child to be more susceptible to various illnesses later in
life.
So a pregnant women would want to take special precautions to avoid high EMF levels. For example
e Keep a good distance between your tummy and any electric oven (2 feet for an electric oven and at
least 5 feet from a microwave oven) while it is cooking.
е Do notallow any cell phone to come into contact with your tummy. Try to keep them at least 18
inches away at all times. And if at all possible, avoid having a wireless phone in your house.
We recommend that pregnant women learn as much as you can about EMF, from our website and
elsewhere. This is a very important time to minimize your exposure to electromagnetic radiation.
Electro-HyperSensitivity
Some people have somehow become sensitized to certain kinds of EMF, rather like hay-fever sufferers who
have become sensitized to pollen. People who are sensitive to EMF are called Electro-HyperSensitive (EHS)
or just Electro-Sensitive.
EHS people react to much lower levels of EMF than the rest of us, and they may be more likely than others
to suffer serious diseases such as cancer when exposed to high EMF levels.
Although you may not be EHS right now, you could become EHS if exposed frequently to high levels of EMF.
The condition is acquired, and appears to be caused by previous EMF exposure.
Using Our EMF Guidelines
Until we know for sure what is, and is not safe, we believe the only sensible way to deal with electromagnetic
radiation is to act on the precautionary principle. (Treat it as harmful until it proves to be safe.)
Actually, there is already plenty of evidence that EMF is harmful, at least to the health of some people. See
http://emwatch.com/emf-research-quality-and-quantity/. So it is unlikely that it will ever be proven to be safe.
The EMF Guidelines are intended to be useful and practical, but to make the best use of them you will need
to have access to the appropriate EMF meter (either a low-frequency meter or a radio-frequency meter, or
both)
Reducing Your EMF Exposure
Radiation exposure has two components: intensity of radiation, and duration of exposure.
It usually takes many years of EMF exposure to cause serious disease, and in the case of cancer this can be
a decade or more. (It can even be two or three decades.)
——————— s h
303 / 569 287 / 340 303 / 570
EMWatch.com - EMF Guidelines
So it is a good idea to reduce your exposure now - before you get sick — to prevent your body from
accumulating more radiation damage.
EM Watch has plenty of information about how to reduce EMF exposure from many different sources. But
without an EMF meter it is hard to know how much radiation you are getting, and where it might be coming
from. So you may find it hard to take meaningful action.
That is why we have reviewed what we consider to be the best low-frequency EMF meters as well as the
best radio-frequency EMF meters and recommend that you get one of each, and use them to make your
home and workplace safer.
І hope you will be able to make use of these ЕМЕ Guidelines to reduce your ЕМЕ exposure and safeguard
your health. | don't need to remind you how precious that is!
Robert Sinclaire
www.emwatch.com
--------:-:-і:/ФБЫР--:-БС:;-
304 / 569 288 /340 304 /570
EMWatch.com - EMF Guidelines
Notes on Appendix 1 & 2
Appendix 1 shows the various international limits and recommendations for exposure to Radio-Frequency
electromagnetic radiation (or EMF) in descending order (highest limits on top).
EM Watch's own EMF Guidelines are also shown in this table, and the colors reflect the same risk levels we
used in the Guidelines on page 1. (High risk is red.)
Notice the huge disparity between different countries' limits. Leading the pack is the USA (with Canada and
Japan) whose legal limit is 1000 times higher than Austria (already in our High Risk band) and 10,000 times
higher than the Biolnitiative Report recommends.
Appendix 2 is similar to Appendix 1, but shows various limits and recommendations for exposure to Low-
Frequency magnetic radiation, again in descending order (highest limits on top), together with EM Watch's
Guidelines.
The table is color-coded to reflect the same risk levels used in the Guidelines on page 1. (High risk is red.)
Again you will notice the enormous range.
Many countries do not even set statutory limits for this kind of radiation, despite known health implications.
в -
305 / 569 289 / 340 305 / 570
EMWatch.com - EMF Guidelines
Appendix 1 — Radio-Frequency Electromagnetic Limits and Recommendations
306 / 569
| EM Watch Electromagnetic Radiation Exposure Guidelines Copyright: www.emwatch.com
Radio / Microwave Radiation - International Safety Limits (Highest levels at top)
Electric
Field Power Density Country or Organization
Strength
mV/m W/m2 uW/m2
650 0.001 1120 EM Watch Guidelines — Maximum for Level 3 - Moderate Risk
614 0.001 1000 Biolnitiative Report - Limit for Long-Term Exposure to Pulsed Signal
614 0.001 1000 Salzburg, Austria (1998) Sum GSM
614 0.001 1000 Italy statutory limit for a single frequency
600 0.001 954.9 Council of Europe (2011) - proposed indoor limit (also see 200 mV/m)
200 0.0001 106.1 Council of Europe Report (2011) - proposed indoor limit for "medium term"
194 0.0001 100.0 Building Biology Standard (2003) - Pulsed RF -"Extreme Anomaly" level
135 0.0000 48.1 Median Level of 15 US cities in 1977 (Mainly VHF TV)
100 0.0000 26.5 EM Watch Guidelines — Maximum for Level 2 - Slight Risk
61 0.0000 10.0 Salzburg, Austria (2002) GSM / 3G Limit for Residences (Outdoors)
43 0.0000 5.0 Building Biology Standard (2003)- Pulsed RF -"Strong Anomaly" level
— —— » )—
290 / 340
306 / 570
EMWatch.com - EMF Guidelines
Appendix 2 — Low-Frequency Magnetic Radiation Limits and Recommendations
| Low-Frequency Magnetic Radiation — International Safety Limits (Highest levels at top)
MilliGauss | MicroTesla Country or Organization
5.0 0.5 EM Watch Guidelines — Maximum for Level 3 - Moderate Risk
5.0 0.5 Building Biology Standard (2003) - ELF magnetic -"Extreme Anomaly"
29 0.25 American National Standards Institiute (ANSI) limit
2.5 0.25 National Council for Radiation Protection and Measurement (NCRP)(USA)
2.5 0:25 Confederation of Professional Employees (Sweden)
20 0.2 ЕМ Watch Guidelines - Maximum for Level 2 - Slight Risk
2.0 0.2 Biolnitiative Report - Planning Limit for all new construction projects
— — o jp
307 / 569 291 / 340 307 / 570
SECUR
308 / 569 292 / 340 308 / 570
«See rs.
310 / 569 294 / 340 310/ 570
EMF Levels & Safety
It can be very hard to say exactly what levels of EMF are safe, because safety in this arena is often a relative concept
based on frequency, exposure time, and possible individual sensitivity. Even then, studies are often considered incon-
clusive plus there is the potential for political and financial agenda to steer perception one way or the other.
In order to be fair and equitable while remaining informative, this document has been assembled in order to examine /
compare / contrast various safety standards, average environmental levels and references along a continuum to better
explain technical measurements in context. This document is offered free of charge, though if published, posted or
reproduced in any fashion, crediting ScanTech as the document creator is requested.
Magnetic Fields Conversion Table
1 mG (milliGauss) - 100 пТ (nanoTesla)
1 nT 5 10 uG (microGauss) or 0.01 mG
100 microTeslas - 1 Gauss
1 microTesla - 10 mG
1 milliTesla - 10 Gauss 1 Tesla - 10,000 Gauss
1 nT = 1000 рТ (picoTeslas) = 0.01 mG (10 microGauss) strongest brainwave is 1,000 times less
1рТ- 1000 fT (femtoTesla)
1 nT = 1,000,000 fT The best resolution of a SQUID (Super Quantum Interference Device) is 1,000,000 times less
Magnetic Fields - A Relative Comparison
LOW LEVEL MAGNETIC FIELDS
Smallest value in a magnetically shielded room 10^-10 Gauss (0.1 nanoGauss)
SQUID 1.0 fT (femtoTesla)
(0.1 nanoGauss)
Human Brain Magnetic Field 0.1 — 1.0 pT (picoTeslas)
( 0.01 - 0.1 microGauss)
Human Heart Magnetic Field 50^-12 Tesla (5 microGauss)
Galactic magnetic field 10 microGauss
Solar Wind 50 microGauss
Interstellar molecular cloud 1 milligauss
Interstellar Space 10^-6 Gauss (1 microGauss)
311 / 569 295 / 340 311/570
312 / 569
EMF & RF Safety Levels - A Comparative Guide
www.scantech7.com
Hypothesized & Observed Animal Sensitivies to Magnetic Fields
Honeybees
Homing Pigeons
Sharks & Whales
Lowest level to cause reaction in Electromagnetically Sensitive Patients
Swedish Safety standard
California Safety Limit for Public Schools
Indoor EMF levels (when good wiring practices followed)
New Swiss Standard
Maximum residential levels in Brentwood TN & Irvine, CA
ScanTech
214.912.4691
0.25 mG
0.1 mG
0.5 mG
0.1 - 0.2 mG
1.0 mG (proposed US EPA standard)
1.2 mG
0.1 — 1.2 mG
2.5 mG ELF 0.25 mG VLF
4 mG
Cancer researchers concerned with recent powerline issues are coming up with many reports on oncological effects of
very low-level 1 mG ELF electromagnetic fields
Leukemia studies which link low level EMF fields
2-4mG
A study (Ahlbom & Feychting, 1993) reported that at 2 mG and above, exposed children were 2.7 times as likely to de-
velop cancer as unexposed children, and at 3 mG and above, the odds rose to 3.8 times as likely!
Computer Monitors - VDTs should produce magnetic fields of no more than 2 mG at a distance of 30 cm (about 1 ft) from
the front surface of the monitor and 50 cm (about 1 ft 8 in) from the sides and back of the monitor.
The TCO'92 standard has become a de facto standard in the VDT industry worldwide. A 1999 standard, promulgated by
the Swedish TCO (known as the TCO'99 standard), provides for international and environmental labeling of personal
computers. Many computer monitors marketed in the U.S. are certified as compliant with TCO'99 for low magnetic fields.
Indoor EMF levels with poor wiring practice
Hotspots near breaker boxes, transformers
Directly beneath high voltage lines
Amount which affects CRT computer monitors (flat screens immune)
STRONGER EMF FIELDS
3 - 20mG
20 — 2000 mG
2- 250 mG
10 mG
(please note that the DC Magnetic Fields listed are not generally attributed as having negative health effects -
and in fact, a number of alternative health experts actually recommend using magnets for healing and fitness)
Earth DC Magnetic Field (natural)
Earth DC Magnetic Fields (affected by building structure)
Recommended Limit for Pacemakers
Refrigerator Magnet (thin label type)
Magnetic Field which could erase magnetic data
Average Bar Magnet (DC)
Independent research finds a change in blood behavior
Strongest Inexpensive Ferrite Magnets
330 mG(equator) - 670 mG (poles)
200 mG — 800 mG
1000 mG (1 Gauss)
10 Gauss
10 Gauss
100 Gauss
500 Gauss
1000 Gauss
High magnetic field levels exceeding 100 Gauss (100,000 mG) may cause a temporary visual flickering sensation
called magnetophosphenes which disappears when the field is removed.
Gauss required to affect / erase magnetic tape
Magnets used in Biomagnetic Therapy (DC)
High Powered Neodymium N42 - N45 Magnets (DC)
296 / 340
2000 - 3000 Gauss
300 - 3000 Gauss
7500 - 9200 Gauss
312/570
313 / 569
EMF & RF Safety Levels - A Comparative Guide ScanTech
EXTREME LEVEL MAGNETIC FIELDS
High Level Laboratory Superconducting Electromagnet 100,000 - 130,000 Gauss
Strongest Sustained Magnetic Field in a Lab 450,000 Gauss
Strongest Magnetic Spike artificially produced (4 - 8 microseconds) 10,000,000 Gauss +
Magnetic Field Instantly Lethal to Organic Life 10^9 Gauss
Surface of a Neutron Star 10^12 - 10^13 Gauss
Surface of a Magnetar 10^15 Gauss
Highest Theorietical Magnetic Field 10^49 - 10^53 Gauss
EMF MEASURING INSTRUMENT RANGES
Typical Range for inexpensive EMF meter 1-10 mG
Range for Quality EMF meter 0.1 — 200 mG
Sensitive High Quality Reference Meter 0.01 — 2000 mG
Commerical High Field Gaussmeter 1 mG - 20 kilogauss
ICNIRP Guidelines for EMF Exposure
International Commission on Non-lonizing Radiation Protection (ICNIRP) is an organi-
zation of 15,000 scientists from 40 nations who specialize in radiation protection.
Exposure (60 Hz) Electric field Magnetic field
Occupational 8.3 kV/m 4.2 G (4,200 mG)
General Public 4.2 kV/m 0.833 G (833 mG)
International Commission on Non-lonizing Radiation Protection (ICNIRP) is an organization of
15,000 scientists from 40 nations who specialize in radiation protection.
Source: ICNIRP, 1998.
The National Radiological Protection Board (NRPB) says the UK should adopt international exposure standards. The
NRPB has recommended for many years that nobody should be exposed to a level higher than 1,600 microTeslas. (16
mG)
But in a consultation document on restricting people's exposure, it now recommends the UK should adopt the guidelines
of the International Committee on Non-lonizing Radiation Protection (Icnirp).
The commission's recommended level is far lower, at 100 microTeslas. (1 mG)
297 / 340
www.scantech7.com 214.912.4691
313 /570
314 / 569
EMF & RF Safety Levels - A Comparative Guide
www.scantech7.com
ScanTech
214.912.4691
ACGIH Occupational Threshold Limit Values for 60-Hz EMF
American Conference of Governmental Industrial Hygienists (ACGIH) is a professional organization that facili-
tates the exchange of technical information about worker health protection. It is not a government regulatory
Occupational exposure should not
exceed for longer than 2 hours
Exposure limit for workers as sug-
gested by the ACGIH
Prudence dictates the use of protec-
tive clothing above
Exposure Limit for workers as sug-
gested by the IRPA/INIRC
German Limit
Exposure of workers with cardiac
pacemakers and other electronic
implants should not exceed.
Montana has adopted this exposure
limit and may be authoritative in the
EU soon.
Recommended 1996 as maximum
for "workers" and their working envi-
ronments by the NCRP, but not yet
official.
Influences Melatonin synthesis**
Already viewed as "critical" by many
scientists
Aaronia "E2" recommendation
Recommended 1996 as maximum
for "private individuals" by the NCRP,
but not yet official
Aaronia "E1" recommendation
agency.
Electric field
25 kV/m
20 kV/m
15 kV/m
10 kV/m
5 kV/m
1 kV/m
100 V/m
10 V/m
1 V/m
Magnetic field
10 G (10,000 mG)
1 G (1,000 mG)
5 G (5,000 mG)
1 G (1,000 mG)
1 G (1,000 mG)
10 mG
1.0 mG
0.1 mG
American Conference of Governmental Industrial Hygienists (ACGIH) is a professional organization that facili-
tates the exchange of technical information about worker health protection. It is not a government regulatory
agency.
Source: ACGH, 2001.
298 / 340
314 / 570
EMF & RF Safety Levels - A Comparative Guide ScanTech
www.scantech7.com 214.912.4691
315 / 569
RF Levels & Safety
OSHA 1910 Subpart С 1910.97 Occupational health and environmental control Non-ionizing radiation
The exposure limit in this standard (10 mW/sq. cm.) is expressed in voluntary language and has been ruled unenforce-
able for Federal OSHA enforcement. The standard does specify the design of an RF warning sign.
For PCS antennas, the 1992 ANSI/IEEE exposure standard for the general public is 1.2 mW/cm-sq
For cellular phones, the ANSI/IEEE exposure standard for the general public is 0.57 mW/cm-sq
ICNIRP standard is 0.40 mW/cm-sq for cellular phone frequencies and 0.90 mW/cm-sq for PCS phone frequencies
NCRP guideline is 0.57 mW/cm-sq for cellular phone frequencies and 1.00 mW/cm-sq for PCS phone frequencies
C95.1 - 1999 IEEE / ANSI Standard 1 mW/cm^2 controlled environment 0.2 mW/cm^2 public averaged over 6
minutes
IEEE guidelines legally enforceable vary by frequency (10000 / frequency^2)
Pacemaker Manufacturers
Guidant 5.2 mW / cm^2
Medtronics 2.6 mW / cm^2
Massachusetts adopted IRPA recommendations 200 microwatts/ cm^2 SAR 0.04 W / kg
Kirkland AFT Portland, Oregon 100 microwatts / cm^2
Soviet Union 1 microwatt / cm^2
Humans absorb most radiation between 30 - 100 MHz and especially between 77 - 87 MHz.
SAR for cell phones - SAR stands for Specific Absorption Rate, which is the unit of measurement for the amount of RF
energy absorbed by the body when using a mobile phone. Energy absorption from RF fields in tissues is measured as
a SAR within a given tissue mass
The unit of SAR is watts per kilogram ( W/kg )
RESOURCE LINKS FOR LOOKING UP THE SAR RATINGS OF VARIOUS CELL PHONES
http://www.mmfai.org/public/sar.cfm
www.fcc.gov/oet/fccid
FCC CELL PHONE RADIATION STANDARDS
North American Standard 1.6 Watts per Kg averaged over 1 gram of body tissue
European Standard 2.0 Watts per Kg average over 10 grams of body tissue
Safety factor of 10 later added to create a 0.4 W / kg standard
NCRP recommends 0.08 W / kg
A typical 802.11b wireless network card will transmit at around 30 milliwatts (a few 100mW and 200mW cards out there)
and operates in the 2.4 GHz frequency band. Current FCC regulations limit power output to 1 Watt EIRP (Effective Iso-
299 / 340
315 / 570
EMF & RF Safety Levels - A Comparative Guide ScanTech
www.scantech7.com 214.912.4691
tropic Radiated Power) for 802.11b (2.4GHz) devices
A study conducted іп the Unites States found that, in large cities , the average background RF levels were about 50 p
W/m 2 . About 1% of people living in large cities are exposed to RF fields exceeding 10 mW/m 2. Higher RF field levels
can occur in areas located close to transmitter sites or radar systems.
The average GSM mobile handset has a power output of around 600 milliwatts
Compare this with microwave ovens, which can emit 500 to 700 Watts
RF fields between 10 MHz and 10 GHz penetrate exposed tissues and produce heating due to energy absorption in
these tissues. The depth of penetration of the RF field into the tissue depends on the frequency of the field and is greater
for lower frequencies.
SAR is the basic dosimetric quantity for RF fields between about 1 MHz and 10 GHz. A SAR of at least 4 W/kg is
needed to produce adverse health effects in people exposed to RF fields in this frequency range. Such energies are
found tens of meters away from powerful FM antennas at the top of high towers, which makes these areas inaccessible.
RF fields above 10 GHz are absorbed at the skin surface, with very little of the energy penetrating into the underlying
tissues.
For adverse health effects, such as eye cataracts and skin burns, to occur from exposure to RF fields above 10 GHz,
power densities above 1000 W/m 2 are needed. Such densities are not found in everyday life. They do exist in very
close proximity to powerful radars. Current exposure standards preclude human presence in this areas.
RADIATION LEVELS & SAFETY
Rem ( R oentgen E quivalent M an) is the unit of Dose (actually absorbed taking biological effects into account)
Rad (Roentgen Absorbed Dose) is simply the actual amount of radiation absorbed
Rem - Rads x Quality Factor (QF)
where the Quality Factor depends on the type of radiation. Heavy particles as alphas have a QF of 20, neutrons have a
QF of 3-10 depending on the energy of the neutrons. Betas and gammas have a QF of 1.
The amount of ionising radiation, or 'dose', received by a person is measured in terms of the energy absorbed in the
body tissue, and is expressed in gray . One gray (Gy) is one joule deposited per kilogram of mass.
Equal exposure to different types of radiation expressed as gray do not however necessarily produce equal biological
effects. One gray of alpha radiation, for example, will have a greater effect than one gray of beta radiation. When we talk
about radiation effects, we therefore express the radiation as effective dose, in a unit called the sievert (Sv).
1 Rem = .01 Sieverts
A former unit of (radio)activity is the Curie - 1 Bq is 27 x 10 -12 curies.
Title 10 Code of Federal Regulations Part 20 (10CFR20) is the NRC regulation governing radiation protection at a nu-
clear power plant. This regulation imposes requirements on such important items as annual allowed radiation exposure,
radiation protection methods, radioactive releases, and records.
Adult workers may receive a whole body dose 5 Rem per year; minors are restricted to 0.5 Rem per year; pregnant
women are restricted to 0.5 Rem during the term of the pregnancy (for protection of the embryo). For comparison, actual
physical effects (minor blood changes) from radiation exposure are not expected until a person receives 25 Rem in a
short period of time. Higher eye and extremity doses are allowed because these have less effect than on that part of the
316 / 569 300 / 340 316 / 570
EMF & RF Safety Levels - A Comparative Guide ScanTech
www.scantech7.com 214.912.4691
body containing blood-forming organs.
However there is no scientific evidence of risk at doses below about 50 millisieverts in a short time or about 100 mil-
lisieverts per year. At lower doses and dose rates, up to at least 10 millisieverts per year, the evidence suggests that
beneficial effects are as likely as adverse ones.
High radiation areas are those where a person could receive more than 100 millirem in an hour.
At a nuclear plant, areas containing radioactive materials may be classified according to radiation level, contamination
level, and airborne radioactivity level. Unrestricted areas are those where a person could expect to receive less than 500
millirem in a year.
Background radiation levels are typically around 300 millirem per year. In some areas of the world, background levels
can reach as high as 15,000 millirem
Naturally occurring background radiation is the main source of exposure for most people. Levels typically range from
about 1.5 to 3.5 millisievert per year but can be more than 50 mSv/yr. The highest known level of background radiation
affecting a substantial population is in Kerala and Madras States in India where some 140,000 people receive doses
which average over 15 millisievert per year from gamma radiation in addition to a similar dose from radon. Comparable
levels occur in Brazil and Sudan, with average exposures up to about 40 mSv/yr to many people.
Several places are known in Iran, India and Europe where natural background radiation gives an annual dose of more
than 50 mSv and up to 260 mSv (at Ramsar in Iran). Lifetime doses from natural radiation range up to several thousand
millisievert. However, there is no evidence of increased cancers or other health problems arising from these high natural
levels.
1 adult human (100 Bq/kg) 7000 Bq
1 kg of coffee 1000 Bq
1 kg superphosphate fertiliser 5000 Bq
The air in a 100 sq metre Australian home (radon) 3000 Bq
The air in many 100 sq metre European homes (radon) 30 000 Bq
] household smoke detector (with americium) 30 000 Bq
Radioisotope for medical diagnosis 70 million Bq
Radioisotope source for medical therapy 100 000 000 million Bq
1 kg 50-year old vitrified high-level nuclear waste 10 000 000 million Bq
1 luminous Exit sign (1970s) 1 000 000 million Bq
1 kg uranium 25 million Bq
] kg uranium ore (Canadian, 1596) 25 million Bq
1 kg uranium ore (Australian, 0.396) 500 000 Bq
1 kg low level radioactive waste 1 million Ва
1 kg of coal ash 2000 Bq
1 kg of granite 1000 Bq
317 / 569 301 / 340 317 / 570
EMF & RF Safety Levels - A Comparative Guide ScanTech
www.scantech7.com 214.912.4691
RADIATION LEVELS & THEIR EFFECTS
The following table gives an indication of the likely effects of a range of whole body radiation doses and dose rates to
individuals:
10,000 mSv (10 sieverts) as a short-term and whole-body dose would cause immediate illness, such as nausea and de-
creased white blood cell count, and subsequent death within a few weeks.
Between 2 and 10 sieverts in a short-term dose would cause severe radiation sickness with increasing likelihood that this
would be fatal.
1,000 mSv (1 sievert) in a short term dose is about the threshold for causing immediate radiation sickness in a person of
average physical attributes, but would be unlikely to cause death. Above 1000 mSv, severity of illness increases with
dose.
If doses greater than 1000 mSv occur over a long period they are less likely to have early health effects but they create a
definite risk that cancer will develop many years later.
Above about 100 mSv , the probability of cancer (rather than the severity of illness) increases with dose. The estimated
risk of fatal cancer is 5 of every 100 persons exposed to a dose of 1000 mSv (ie. if the normal incidence of fatal cancer
were 25%, this dose would increase it to 30%).
50 mSv is, conservatively, the lowest dose at which there is any evidence of cancer being caused in adults. It is also the
highest dose which is allowed by regulation in any one year of occupational exposure. Dose rates greater than 50 mSv/yr
arise from natural background levels in several parts of the world but do not cause any discernible harm to local popula-
tions.
20 mSv/yr averaged over 5 years is the limit for radiological personnel such as employees in the nuclear industry, ura-
nium or mineral sands miners and hospital workers (who are all closely monitored).
10 mSv/yr is the maximum actual dose rate received by any Australian uranium miner.
3-5 mSvlyr is the typical dose rate (above background) received by uranium miners in Australia and Canada.
3 mSvlyr (approx) is the typical background radiation from natural sources in North America, including an average of al-
most 2 mSv/yr from radon in air.
2 mSvlyr (approx) is the typical background radiation from natural sources, including an average of 0.7 mSv/yr from ra-
don in air. This is close to the minimum dose received by all humans anywhere on Earth
0.3-0.6 mSv/yr is a typical range of dose rates from artificial sources of radiation, mostly medical.
0.05 mSvlyr , a very small fraction of natural background radiation, is the design target for maximum radiation at the pe-
rimeter fence of a nuclear electricity generating station. In practice the actual dose is less.
318 / 569 302 / 340 318 / 570
319 / 569
EMF & RF Safety Levels - A Comparative Guide
www.scantech7.com
90 dB
92 dB
95 dB
97 dB
100 dB
102 dB
105 dB
110 dB
115 dB
NOISE LEVELS OSHA Safety Limits
8 hours
6 hours
4 hours
3 hours
2 hours
1.5 hours
1 hour
0.5 hours
0.25 hours or less
303 / 340
ScanTech
214.912.4691
319 / 570
«See rs.
320 / 569 304 / 340 320/ 570
1. puro, МТРА PUBLIC INSPECTION рх 5196
The aforementioned panel under the direct presidential directive signed
on 26 September 1917, has been tasked with responsibility ef providing
answers to a most troublesome and disturbing phenomenon, that ef other-world
visitation and what it portends fer the human family, It is im this vein that
the panel has addressed the problem and in providing possible answers,
II, TABLE OF CONTENTS
i f A. Nature ef the Investigation.
hes | B, Panel's Centributiem te tke TOP SECRET MAJESTIC Веззагсһ and
ма Intelligence Program,
"M
b. ' С. А Review of the Military Assessment with Selected Cemments Drawn
8/71: fren Cenclusiems ef the JIC and ЦС Members.
D, Problems ia Relation te Technology.
E, Problems im Relation te Nuclear Weapens Development,
F, Preblems in Relation te Bielegical Warfare Pregramo,
0. Preblems in Relation te Gemetic and Pharmaceutical Deve lopment
Н. Preblem im Relation te New Materials Deve lopment,
I, Preblems im Melatiem te Planned Future Rocket Deve lopment Pregrams,
6%. Je Preblems іл Relatien te Nuclear Prepulsien Development Pregrams,
2. K, Preblems in Relation Ae Intelligence Gathering and Analysis.
ha ) s 1. Preblems in Relation te Foreign Policy and National Security,
M M, Preblems in Relatien te Déenes tic and Censtitutienal Issues,
k h ^ M, Preblems in Relation te Secial, Religieus and Scientific Reaction.
ri
к FE ТА 0. Preblems in Melatien te the Се14 War Development,
L P, Preblems im Melatien te the Government Policy ef Contrel and Denial,
| FOR OFFICIAL USE ONLY
АЕ» Ds
Да ... DER бї MTLE пития этиште 834021-1
e m
Ad. >, S а
cus SAS NES
=
е PS ye рагу
y `
312 / 340 à 327 / 570
O
N
N
bs
UY
о
(Тө)
«СО.
321 / 569 306 / 340 321/570
Y p
PP DO. TEES
‘November 4, 19537
То: Tho Director of Central Intelligence
І have studied the MJTWELVE Operations Plan of June 16,
2955, ол the subject of instructions for the expenditures of
tne National UFO Intelligence Program, and more Bpocifically,
the Special Operations Instructions to be issued to Unified
and Specific Major Gommands and Commanders. Іп connection
with my Classified Basic Authorization of March 22, 1953, and
the Implementing Instructions of January 23, 1953, 1 have no
further instructions +o add,
All the provisions covered in your NSC letter of May 22, 1953,
are satisfactory to me, and 1 approve them, including tho
changes recommended Бу your intelligence staff, with the fol-
lowing exceptions:
(8) The penultimate paragraph, page 4 of Inclosure
Number 3 to your letter needs to be revised. J am
concerned that this paragraph as writton could be
misinterpreted by Regional and Local Commanders CONUS
as giving them license to go beyond the restrictions
set forth in these documents if the situation wero to
appear serious enough ав to threaten hostile Soviet
action. It seems beet to mo to oliminatc this para-
graphe it has, been suggested that this difficulty
could be averted by deleting the words "utilizing
the criteria and procoduros set forth in these instruc-
tione" and substituting therefor "observing the criteria,
procedures, and restrictions set forth in these anstruc-
tions." X would prefer the deletion of this paragraph.
altogether from this and 023 related documents.
(b) With regard to the.baeic lotter of Мау 22, 1953,
Y would like to have-added to paragraph 2. the words
.. “subject to COMINT agreements іп accordance with Ws,
йі = Mx ап СТА intelligence collection directives.” ^7 c
“ewan гер pem - а edad | k 2. ñ v. "o Мұ IDEE кы Ee Dono tm n
PRR "Sv son
322 / 569 307 / 340 322/57
О UN E i nts s. .
323 / 569
lo
aize tthe need for he utmost discretion
"aud understanding in exercising the authority set forth in -
these documents. Accordingly, І would iike you to find
‘pome way to brief the various Authorizing Commanders on the
> gubjoct to ensure that all are of one mind ав to tho letter
and spirit of these instructions. Preferably, I would like
to mee this done in а closed meeting to bc arranged through
the Director of the National Security Agency, yoursels, and
representatives of the Md-12/special Studies Project. 1
specifically want Project JEHOVAH director Professor Albert
Einstein and Doctor Robert Oppenheimer to inject any useful |
commento іо the briefing as they are most informed оп the
physics rciated to the subject. Perhaps the annual Quantico
conference could provide an opportunity to do this without
the publicity which would call attention to a special meetings
Sincerely,
Dwight D. Еі зеломех
308 / 340
= um
ШӘ oe
NECEM
—— +
и
p
|
І
|
323/57
324 / 569
? copies
TOP SECRET (downgraded to SECRET)
UFO
November 4, 1953
To: The Director of Central Intelligence
I have studied the MJTWELVE Operations Plan of June 16,
1953, on the subject of instructions for the expenditures of
the National UFO Intelligence Program, and more specifically,
the Special Operations Instructions to be issued to Unified
and Specific Major Commands and Commanders. In connection
with my Classified Basic Authorization of March 22, 1953, and
the Implementing Instructions of January 23, 1953, I have no
further instructions to add.
All the provisions covered in your NSC letter of May 22, 1953,
are satisfactory to me, and I approve them, including the
changes recommended by your intelligence staff, with the fol-
lowing exceptions:
(a) The penultimate paragraph, page 4 of Inclosure
Number 1 in your letter needs to be revised. І am
concerned that this paragraph as written could be
misinterpreted by Regional and Local Commanders CONUS
as giving them license to go beyond the restrictions
set forth in these documents if the situation were to
appear serious enough as to threaten hostile Soviet
action. It seems best to me to eliminate this para-
graph. It has been suggested that this difficulty
could be averted by deleting the words "utilizing
the criteria and procedures set forth in these instruc-
tions" and substituting therefor "observing the criteria,
procedures, and restrictions set forth in these instruc-
tions." І would prefer the deletion of this paragraph
altogether from this and all related documents.
(b) With regard to the basic letter of May 22, 1953,
I would like to have added to paragraph 2.b the words
"subject to COMINT agreements in accordance with NSA
and CIA intelligence collection directives."
TOP SECRET (downgraded to SECRET)
309 / 340 324 / 57
TOP SECRET (downgraded to SECRET)
_2—
I cannot overemphasize the need for the utmost discretion
and understanding in exercising the authority set forth in
these documents. Accordingly, I would like you to find
some way to brief the various Authorizing Commanders on the
subject to ensure that all are of one mind as to the letter
and spirit of these instructions. Preferably, I would like
to see this done in a closed meeting to be arranged through
the Director of the National Security Agency, yourself, and
representative of the MJ-12 Special Studies Project. І
specifically want Project JEHOVAH director Professor Albert
Einstein and Doctor Robert Oppenheimer to inject any useful
comments to the briefing as they are most informed on the
physics related to the subject. Perhaps the annual Quantico
conference could provide an opportunity to do this without
the publicity which would call attention to a special meeting.
Sincerely,
Dwight D. Eisenhower
TOP SECRET (downgraded to SECRET)
exempt from declassification
found in Dulles security oe
„К,
325 / 569 310 / 340 325 / 57
SECUR
326 / 569 311/340 326 / 570
SECUR
328 / 569 313 / 340 328 / 570
FY 2018 Program Acquisition Costs by Weapon System
2t AD DUE IY= s
THAAD Ballistic Missile Defense je + `, € 5D JOINT
The Terminal High Altitude Area Defense Y
(THAAD) is a key element of the Ballistic Missile
Defense System. The THAAD Battery will
provide transportable interceptors,
using "Hit- To-Kill" technology to destroy
ballistic missiles inside and outside the
atmosphere. A Battery consists of
6 truck-mounted launchers, 48 interceptors
(8 per launcher), І AN/TPY-2 radar,
and | Tactical Fire Control/Communications
component.
Mission: Provides Combatant Commanders with a deployable, ground-based missile defense
capability against short and medium-range ballistic missiles and asymmetric threats inside and
outside the atmosphere.
FY 2018 Program: Supports the procurement of 34 interceptors and associated
components, as well as support and training equipment. Continues fielding and sustainment
activities for seven THAAD Batteries. Continues development of THAAD software upgrades
to address threat packages, defense planning, improved capability to engage short-range ballistic
missiles, medium-range ballistic missile, limited intermediate-range ballistic missile threats, and
limited integration of the THAAD battery capability into the Integrated Air and Missile Defense
Battle Command System (IBCS) planning process.
Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA
Budget per year are around $ 750 millions for this weapon system above.
It just need a few upgrades to shoot down E.T. And blow up E.T Bases.
Е
SS
x
.
-
Е
S
11 0411 images
MAR Report 174
>
е
0
с
u;
Чом.
©
же
=
0
Е
T
б
с.
Ф
a
5
ж?
°
£
0.
t
0
Ф
0
5
с
5
G
>
Ф
2
Ф
Е
май
TBM - Tunnel Boring Mach
U.S. Ait Force Tunnel Boring Machine 1982
„= e
bd THIS IS ONE OF THE WEAPONS GOD GAVE US.
EA 3. —
PEL DO
Vir ee 4... чч
Ў Ld Т к Е - - ' E Е ва "а
“= 6-74) . - „ “А132 /,34 ' 4 = ° 2905720
ЛАГИ
AU HE
|
m
М
145 / 569
SECUR
331/569 315 / 340 331/570
SECUR
353 / 569 337 / 340 353/570
RECEIVED
III, CONCLUSIONS
1. Current studies of otherworld visitation are im three
phases:
=, Technology exploitation
b, Interplanetary travel
с. Cultural communication
2, Оп 19 September 1917, the IAC, JIOA, and the JIC, reviewed
а Top Secret intelligence mport titled PORT TO THE PRESTDENT ا MM —
` 1=\, MAJIC BYES ONLY, DTG 000190917, Tho report montions: "Inc
with your directive e e « 9. uly 1917, sn attached "REPORT on ae
SAUCES" ; is respeotfully submitted, Тп consonance with your instructions,
advisors from State, Treasury, War and Navy Departments assisted mo on a-
two month exploratory mission concerning the reality of other-world visitation, `
The principle investigators and storage areas were visited, Successful efforts
were made to reach scientists of all levels as measurod by their work in
classified defense projects, Conferences were held with national seaurity
officials and leaders of private industry. Approximately 1,200 memoranda and
p intelligence reports were considered, The roport presents this situation
against а global background my estimates, current and projected, in both the
П.5., and allied countries, and recommendations deemed to be sound courses of
action for formulating plans and policies in light of recent developments.
3. All efforts have been made to identify the country or private
concern wich ceuld have the technical and finacial resources necessary to
produce such а long-range flight, 5з far, no country on this earth has the
means and the security of its resources to produce such,
h, А consensus reached by members of the panel, that until
positive proof that the Russians did not attempt a series of reconnaissance
flights over our most secure installations—the sightings and recovered
objects are interpalnetary in nature,
5. Тһе occupants of these planform vehicles аге, in most
respects, human or human-like, Autopsies, so far indicate, that these beings
share the same biological al needa аз humans,
332 / 569 316 / 340 332/570
IV, DISCUSSIOR
A. Mature of the Investigation.
An analysis has been made of the first one-hundred intelligence
reports ia the ATIC Imterrogatiom Reports ami the ULATT EXPLOITATION
MAJESTIC SERIES 1-25, prepared by the Military Imtelligosco Soctiom of
GHCÁIPU, ix order te establish what material of flying saucer intelligence
valu concerning the ULATT is available ia these reports.
1. The ATIC Interrogation Reports, wumherod 1 to 93 (the last
dated Decemier, 1950), present significant information ой a break
variety ef subjects amd areas where witmessos wore dotaimcd subscquomb
to the »ostel9l7 imcidemt. The us-published documents oewpltIXUS records:
of imterrogatiom derived from the accumulated reports ow interviews of
selected witnesses from New Mexico amd military persomaol ixvolved ia t:
removal of evidence. |
МИР e d , e
2, Im this(digest, primary attention has been paid to iaformation t m
of bio-medical intelligence interest, particularly іл the ВН programs, Шаа
Dio-medical iatelligence із only one of the substaativo fields: соусгой ETUR
e by these Interrogation Reports. г
$. For the most part, the sources: interrogated wore mot trained
observers, and their stories indicate they have been subject to the
familiar pitfalls common to all eye witaesses. It must be emphasized
that, because the imdermzgators used were mot always specialists Та
this phenomena of celestial scleaces, there is much lack of detail,
R. Because of the umione matura. а? the material nadar study, до...
ва іс а frac -0i- mulii-laysrew security structure has be
arch and development labs for results have beer given to private rese
mE и further study, — — —
we n
лей om Psy-Oy дететортенЬ for MAJESTIC. SS&P Ан curremtly Гос
Cold War СТ activities.
—
/
ilista has yielded valuable | e Utilization of Paperclip зрес!:
із of flight dymamics, biological results ix жеж weapons research im аге:
intelligence gathering techmiques, and chemical agents, mind control, ant
--
| БЕ a s
333 / 569 317 / 340 333 / 570
Because of the wainne mature АҒ the material падат ahidy, x.
lui-Layere Tatras Бате has beam 15 arfact, Host. о?
‘results һата been giver to private research amd də “dovo lopment ded for
further study. — — —
А ^
5. MAJESTIC. SSP are currently focumd om Ps developnest for
Cold War СТ activities. -— TN
в, Utilisation of Paperclip specialists has yielded valuable
results ій жем weapo im areas of flight dymamics, biological
ami chemical agents mini co — Тал at intelligence gathoring techniques,
| GN. NOTE. ‘Operation Paperclip' brought scientists and researchers from Germany after the WWII. 1500
persons in total, and about 100 came later to work with civilian spacerelated research. These specialists mentioned ES
in this document above, ( in paragraph 6 ), must have be contracted from the, in total, 1400 person University pile
that not ended up in NASA. 1500 people was taken from Germany with the intent of using their skills in U.S.A. If p —
you like to dig deeper in it, more information are available at the U.S. Army Intelligence And Secur ity Command. | Lum Pa,
34 / 569 318 / 340 334 / 570
Po
% iiim
B, Panel's: Comtributiom ta MAJESTIC
1. The contribution of the President's Special Panel to the
MAJESTIC TWELVE PROJECT has supplemented informatior ox the UIATT
Program which eeuld not bo ebtained ix amy other way, Altheugh ealy
а small part ef the preject, inmterregatiem За technical aad bio-medical
field has preduced at leas 8,273 items. fer the files ef Military
Intelligence, GHC/IPU, Of these items, | 2,764) в have baan published (up te
December, 1950) in the ULATT KXPLOITATI JESTIC SERIES, The coverage
ef the Ием Mexice incidents, frem the over-all intelligence peint ef
view, has been very geod, (After the Panel's review маз initiated,
QHC/IPU published Та March 1951, two summary "MAJESTIC SERIES," Ме. 98
amd Me, 99, ef the seriés titled "Мем Medical Facilities fer Bielegical
poor а Мем Genetic and Pharmaceutical Development: Pregrams.* These
о rie have apparently made ef much ef the AIC file material
sia кунин ЙО items are жом reported as published "Medical Items" im іле
"Imaterregatiem Reports” - see MAJESTIC SERIES, We, 98, page 1.)
2. Fer the clarification of published reports or fer elaboratien
ef the imfermatiem ef fragmentary mature, resert may be had te the ABC _
files sf unpublished data as well as te the pessibility of reiaterre-
& “gating the sources,
С. Review ef the Military Assessment
With current deployment obligatiems, treep cemmitments, amd few
air greups with stand-by fighters with radar capability, tho Joint Chicfs
are unable at the presemt time, to effect ж complete амі all-encompassing
defense plam that weuld guarantee the pretectiom and well-functioning ef
the matiemal political erder, Persemncl, material, амі logistical
requirements fer such a defomse weuld deplete. curremt reseurcese If such
a crisis should eccurr--im gevermmemt failure te defend amd assure the
public's trust, it is the belief ef the Joint Chiefs, that the fellowing
weuld imsuet insecurity and mistrust; empleymemt of subversive agents;
infiltration; incitere mt ef diserder амі chaos to disrupt normal ccemeny
and undermine pepular suppert of gevermment amd its leaders; seizure ef
authority witheut refereace te the will of the people,
D, Technelogy
At present, the ability te recemstruct tha techmology that may
be eens ahead ef us, the boost te eur current efferts weuld be incalculable,
Areas such ая aircraft and missile design would bencfit enly after w working
understanding has been achieved, Weapons sciences will fellow.
ake
e ает
G=
335 / 569 319 / 340 335 / 570
336 / 569
Е. Nuclear Wenpens Development
8, Genetic and Pharmaceutical Deve lopment Pregrams
Current research im 0.3. amd U.X., cam be accellerated when studies
Н, Жем Materials Development
Cenclusiems reached by the Kir Materiel Cemmand im 1918, орем
tha clese examinatiem ef the material structure ef the Ceremz and Oscura
Peak, М.М, sites, compelled the Air Ferce te launch x mew machimability
research pregram, Samples testod and evaluated by the АМО, suggested that
future materials weuld have te | асегрогабс new alleys and compesites, if
spaos cxpleration амі hypersemie dynamics are te be achieved, AES а result,
mew machiwing techniques are underway fer high-temperature alleys and
titanium, кн
RR
320 / 340
336 / 570
е р ЧИ
I, Planned Future Rocket Development Pregrams
There have been a number ef failed high-altitude гөекеб Launches
„Ке study radiation effects on living organisms, The Rir Ferce ts Prejeot
| BLOSSOM, cenducted at Не1] омаж AFB, із but eme example, Ұ-2 recket
lauxchez at the White Sands Previag Greund, W,M,, have beca kmecked down
by undetermined Jamming, Тһе seurce ef the jamming is believed te come
frea UFO sightings on or near the range, Guidance systems are believed
to bo vulnerable amd this presents a clear and present danger, Such
keeper flights carrying muclear weapens are tee herrific te contemplate,
Shielding ef systems and circuits are uaderway.
Je Nuclear Prøpulsien Deve lopment Pregrans
The AEC амі МЕРА are currently cemducting research fer advanced
technologies im atomic engines and radical prepulsiem studies, Systems
studies at Les Alamos, M.M., Oak Ridge, Temm., and at Lamgoly, Vas, are
attempting te duplicate the water drive and plastic cere clemonts found
on the engine being kept at HAFB, Imtergratiem ef hyéregem base feuls
and electre-hydred с technelory, may өрен up fer us development ef
super-aeredymes with mach 5 capabilities,
Ф K. Intelligence Gathering and Analysis.
Based em what is known of the technelogy amd intelligence ef the
visiters, it is fairly certaim that there will be ether sightings and
encounters ef a spectacular nature, Аз te purpeso and modus operandi,
wo are mot certain, but it is clear, that if these visiters had cenquest
in mind, it would met be difficult fer them, givem their ability te
pemetratien eur airspace at will, and their ability te jam radie, tele-
phone, tel vision, and teletype trans le rids.
So far, reports and sightings are blatant amd deliberate, thus allewing
our intelligence agencies te gather geed data, Ав te the analyses ef
such reperts, only a centimueus wave ef sightings amd caceuaters werld- |
wide, would previde enough data fer ж clear understanding af intent,
Le Foreign Pelicy and National Seeurity
То dato, only Great Britain, Camada, and the Seviet Unier, are
contacted and appraised in the event | imvasiem із cmimemt, It is the
current pelicy ef the Admimistratien that ne ether fereigm countries
will be censulted er advised. The national security status ef the
MAJESTIC operation exceeds that ef the H-bemb deve lopment,
“ `
& ET —
337 / 569 321 / 340 337 / 570
е _— Чи
И. Demestic amd Censtitutiemal Issues
Im dealing with clear vielatiens ef civie law амі guarantees as
defined under the Censtitutiem, it has beem discussed ameng members ef
MAJESTIC TWELVE, that such pretection of individual rights are eut-welrhed
by the mature ef the threat, Only а declaration ef war er а national —
emergency, would give the gevermmcnt the pewer te emact martial law sad
recemd individual rights.
X. Secial, Religieus and Scientific Reactien
It has been the downfall ef creat mations amd cultures whom a mew
reality is mot readily accepted by the nasan. The зәсізі erder was severely
ravaged by the last world war, with great damage te the religieus degma ef
"earth withaut end,” thus так ас a government disclesure irresponsible and
inherently dangereus, The scientific cemmunity would predictably question
such a reaction as a world suffering from a Buck Regers delerium and attack
anyone ef their ewn ranks for believing such famatsy, Sciemee itself, may
underge a traumatic transfermatien, with belief structures in shambles,
putting the institutions under scrutiny by the l&ymam, thus ereding amy
9 credibility, Seience would be left with an image of oredulity,
0. Cold War Development
This is eme ef the most dangereus phenomenon of the twentieth
century, Те misidentify a flight of space objects fer actual Russian
bombers, or te dismiss Russian bombers as phantoms, is the mest idietia
approach te take, Evem though governments may distrust each other, it is the
responsibility and oreed of the military and intelligence prefessienal te
prevent wanton death and destruction of his ceuntry, It is advisable te
maintain seme form ef direct communication with a hostile enemy befere
taking false assumptiens af his response if falty data wrengly indicates
Such, Even using the "Flying Saucer” ruse te create fear and confusien
ameng your enemies leaders, could result im accidental маг, Sven our carly
P, Goverment Policy ef Centrel and Denial
One of the most difficult aspects of controlling the perception im
the publie's mind ef government attempts of denial and ignerance—is actual,
-вопъго1 ef the press, Until a clear intent is established with diplomatio
-relatíens firmly in hand, 1% is the recemendation ef the President's Special
Panel with cencurrence frem MAJESTIC TWELVE, that a policy of strict denial
E ef the events surfacing frem Reswoll, Nolo, and any other incident ef such
caliber, be enforced, А inter-active program ef centrelled releases te the
; * media, in such fashion te discredit any civilian imvestigatien, be instituted
| in accordance with the previsions of the 1947 National Secwrity Aot,
Нона Е
ДАРЫ а
ri Атавы wam.
338 / 569 322 7 340
338 / 570
je о _ =
> LE
: | 2. Of particular interest te the Panel was Site L-2, lecated at
Lat. 33-10-31, Long. 106-28-29, аз this site yielded the mest
material fer analysis, i |
aves
` <.
|
|
|
5./ Lack ef wirimg, fuel systems, cables, motors, hyéraulies, intakes,
1 22147 exhaust, and surface centrols, strongly suggests that the craft
P was designed te travel eutside ef eur atmosphere,
I 6.) The secend craft that impacted at Site 1-3, previded very little
\ =~ evidence that it tee was similar in design, аз the impact was
vertical ia nature and at very high speed, It із believed that
the debris discevered em 2 July 1917, hy а lecal rancher was the
"T result ef a mid-air cellisiem with аң X-plane (ген HAFB; anether
M umidentified objects er pessibly cellided with beth, Radar fila
and tewor logs de met explain the merging ef three radar targets
prier te cellisien amd subsequent crashes.
LARA
КІРІОІТАТІОЯ-МА)55ТІС SERIES Ц, p. 10-102), аз а result e
damage sustained fren чакома Causose .
سگ
339 / 569 323 / 340 339 / 570
oe m
P T ..
cette a, Sre
2.5 d
s А
б. Жл o. en
— „ бы
ра
^
xr
p; 2...
А С ода
— en P
сет ка
i
ss
`
md
° چ ب کہ 223-4 Cx رہ پا V ی ر کک و & 7
1 A ^ A .
> =
” 1 : >
.- VUA
y^ „ус
- s
1%
340 / 569
\ с»
1%
w iy] т^
зА ^
>
. ANNEX A (Cont'd)
The Panel was cencerned ever the contamination ef several SED
persenncl upen coming ix contact with debris sear the power |
plant. One technician was evercemcd and cellasped when he
‘attempted the remeval ef a bedy, во лаг medical technician
went) inte а coma four hours after placing а bedy іл a rubber
wody-bag, 111 feur were rushed te Les Alameg fer observation.
ІТІ Your later died ef seizurem and prefuso bleeding, 811 four
wore wearing pretective suits whem they esma im contaet with
, body fluids frum the eccupamts, |
э.
--
11,
12,
Kutepsies en the feur dead SKD technicians are met cemclusive, It
is believed that the feur may have suffered frem seme ferm ef
texin er a highly cemtagious 4050258. Tissue samplos are currently
being kopt at Fert Detrick, Md. .
The Panel was alse cencerned with the ынша мы release
ef radiation ever the state ef Ием Кехісе. А?ТАС detachment frem
McClellan AFB has conducted several airberne moniter flights ever
Site L-J, Radiatiem readings indicate а high meutren count was
recerded as the plane flew ever the site, Meutrem ceunt drepped
eff as tho plane flew а cemsiderable distance frem the site, À
repert has booa filed with the USASDS, /
Detection ef a high altitude explosiem was recorded by a Preject
MOGUL censtant level ballees өй L July 1917, Radar frema White
Sands Preving Ground амі НАГЗ also detected a surge.
Parachute recevery team frem НАРВ were dispatched te Site L-2.
Урта arrival, the team, realising the mature ef the crash,
radieed imstructiens amd marked crash site fer the investigaters
that arrived later.
(335 Та the epiniom ef the semier AEC medical efficer, owrrent medical
N o
equipment and supplies аге wholly inadequate in dealing with в
largo scale outbreak ef the alten viruse
Facilities at Les Alames amd Maye clinies were considered as
lacking im tha curremt climate,
(On 26 Septenber 1947, the first meeting ef the И5С-1 was held
-te discuss the Kew Maxice incidents амі hew te implement the
policy established by MJ-12 5552,
-3-
324 / 340
340 / 570
341 / 569
1. AJESTIC IWELKYI E
^-^ executive erder dated 2l, September 1917, and giren ремего ef
€
z.
lea
Se
Te
m
9.
3-5
<-> <
ют
| Upen the creation ef the MAJESTIC TWELKVE GROUP by special
autherity by ?DO/L-1, dated 26 September 1917, the Panel was
empewered te Convene and cemduct a review ef all available
evidence and data cellected by gevermment and military
1212111688608 agencies,
Because ef the unique nature ef the 1917/45 crisis, the Panel
recemwemded ta MAJCOM-] that the authority ef the Secretary ef
Defense be ixveked in order te implem xb XSCID Ne, 3/1. .
A meeting wmm held еп в December 1917, between CIA and ПС
eencermimg the IAB, Dr, Vannevar Bush, Chairmam ef the lamel,
requested the ОСТ te eonvey the eemtemts of a letter frem Dr, _
Bush te Secretary Forrestal, thus breaking the deadleck ever
issues cemcerning autherity and policy making doalimg with tho
New Mexice imciéemts and subsequent expleitatiem ef tho finds.
Om 13 January 1948, the MSC, with input from the Panel recemmended
“te the President, that "third party greup frem eutside ef the
Gevermment be ablished fer the purpose of conducting в impartial
and objective” y ef the activities and personnel of the CIA,
18 а result of the DCI's lack ef timely intelligence estimates amd
poer coordination of intelligence activities fer MAJESTIC the MSG
Survey Orevp issued its findings. kt the suggestion ef the Pamel
Chairman, the IAC met en 16 June 1948, at which the cenclusiens ef
the Survey Greup were reviewed, 7
On 18 Pebruary 1919, the IAC met for the purpose ef proposing some
changes ie аси draft proposal en MAJCOM activities,
General Jeseph McNarney, with the assistance "ef Carlisle Nomelsine
and Robert Blum, prepare NSC 50/1. On 7 July 1919, the KSC adopted
the recemmendatiens ef NSC 50/1 which directed the DCI te enlist
the activities ef the IAC in MAJESTIC intelligence activities.
MAJCOM-l meets with the Prosidemt im May 1950.
Admiral Hillenksetter leaves position аз DCI en 7 Octeber 1950.
10, MAJCOM-l with assistance ef the Panel persuades the President to
establish the Psychological Strategy Beard on ls April 1951.
-10- `
———————
325 / 340
341 / 570
® == i
ANNEX В (Cont'd) B
11. Panel member and MAJCOM-l, meet with MAJCOM-l оп-10 Octeber 1950:
along with members ef ис. Tha Chisf ef Global Survey Oreup
desired estimates requested by the Pentagon concerning possible
defense project for MAJESTIC 10015716 552-1.
12, On( December 1950, MAJCOM-l, alerta MAJCOM-l ef а breach in DEW
Üreenland of а UFO en a seuth-wosternly ceurse. HQ IPU alerted J
and dispatched а scientifico team te БІ Indie—Guerrere on the | 2
crash site te ADC НАТР and te АЕС laboratories at Sandia, Мом
12. MAJCOM-l enlists the Panel's aviation censultanta fer the purpese
.. Om 28 December 1950, MAJCOM~1 is provided with the "Black Boek" vs
summaries prepared by the Watch Committee, Begiming avory Friday
the President is briefed on world situation and en MAJESTIC via
the CIA weekly Current Intelligence Revicw.
Э 15. kt the request ef Panel member Cardinal Francis Spellman, met
with the President te disouss the centaiument within the
Саёһо11а Church and its hierchy of religieus speculatien if
mass sightings occur. Such contaimment was successful during
the 1917 sightings when Cardinal Spellman met with the
Secretary ef War en 29 June, Tho President has boen briofed
„7 en Defense Plan 12, which was written in part by the Panel
member,
/
17, Atemic engines for aircraft built here om earth faces many
difficulties because of size and weight ef the reactor and
radiatien shielding, Such a nuclear power plant weuld give
ал aircraft unlimited range,
18. Panel members contributed to the writing of ULATT EE
MAJESTIC SERIES 5 title Hypersonic Small-Disturbance Theory,
which gives consideration Lo a three-dimensional body fixed im
а steady, uniferm, hypersonic stream, The theory assumes that
shock waves can be approximated by abrupt discentinuities and
$9 the planform bedy being thin, so that the slope ef the local
surface in the stream direction im umiformally small.
342 / 569 326 / 340 342 / 570
| е : KAMEI X (Cont'd)
19. МХОМ, а member ef the Panel was instrumental ix supporting the E
the creatien of the Air Force's Sciontific Advisory Board which P»
MAJCOM-5 endorsed, B.
20. МАЈСОМ-5 recemmended te the Air Force Chief of Staff, that the
Top Secret repert Where We Stand, be the basis fer ULATT develep-
ment. MAJCOM-5 urged the COS ta enact the ideas of another report
Science, the Key te Air Supremacy, Major General Curtiss LeMay Е
Stall Directer of Research and M lid secended MAJCOM-5 а, E 4;
views,
21. The Panel Chairman argued Гог funding fer air defense prejeets i
that would be useful im cembating the new menace instead ef
developing ballistic missiles, which have preved te be useless,
22. Оа Jume 15 1917, Dr. Theedore vem Karman chaired the first
meeting of the SAB and discussed hew the Air Forces could
| propare fer x possible air attack im light ef the mmereus UFO
| sightings ever the 0.5.
23. On ih May 1918, MA JCOM-l, arranged fer the premulgatien ef Air
8 Feroce Régulation 20-30, which restered the pewers ef the ЗАВ
az agreed upon by Karzan and LeMay іп 1916.
25. MAJCOM-h had а prepared speech read at a meeting of scientific
aévisers en 7 April 1949, highlighting вем Air Feree B&D
erganisatien and structures ап UFO researeh fer ULATT, ‘Karman
enlisted the aid ef a Panel member te persuade MAJCOM-l, to
endorse a seperate establishment free frem AMC and lemtagem
сөпіге1,
25. Оп 2 January 1950 ж plan was presented te the Air Staff Coumcil
fer seperate RUD fer ULATT,
26. 04.24. January 1950, Research and Develepment Cermand амі the
A
“Starr Deputy Chief ef Staff fer Research and Develepmemt
was created,
21. та May 1951, Panel member MAJCOM-l, endorsed Karman's creation
ef LUDW and his presentatien at tho Pentagon ef а lecture
called "Mebilisatien ef Sciemtific Effert im Westorm Гогороаж
| Countries." ;
( -22-
1 -
1 -
i ==
|
‚ 9
1
| 1
лз сс ЫШТЫШ RR Eon EE EN инт
аа г к ө. alit MUN ARR. دی ےہ بد
343 / 569 327 / 340
343 / 570
344 / 569
3.
ANNII C
— ..
with repeated, unexpected blown. Such в defense cam werk,
only when the enemy із detected, his strength known, his
EE identified, amd, his tactics and mevexenis are ro-
ve
ir
жоарФПз and equipment (herses imeluded), Im 1885, abeut 600
Nanking, Again, mon, equipment, runs, were missing though
OG mp fires and mess tents were undisturbed, During the Pacific
campaign, there have been instances where whele platoons and
larger units Scomed te have disappeared witheut any sign о?
Cenbat er а struggle, Men, equipment, weapons--vanish without
a traco, In all instances the disappearances: eccurred in
trepical climate and in the heat of battle er near cembat
Senes,
Missing alreraft, pilots and crews, are ef special concern
te the military when no explanatiens fit the usual reasons
outside of combat, One such incidant is the disappearance ef a
flight of five U,S, Kary ТВМ-3 Avenger torpedo bombers fren
NAS ria on 5 December 1915. While mo explanatien aa
to why navigation instruments on all five aireraft could have
failed at the same time, and efferts te rescue the lh creunen
were unsuccessful, it is believed that Flight 19 encountered а
at 2,300 feet, Den't сете after ша,” After ene of the most intensive
air-sea rescue operations in U.S, naval history, the Naval Beard of
UT said, ag were not able to make even a кее guess as te what
appened.
-13-
—MÀ—
328 / 340
344 / 570
345 / 569
h.
6,
m — — "Hu
- ANNEI C (Cent'ë)
Om 7 January 1918, а ANG F-51 pilot was lest near Gedman AFB,
Kentucky, After being directed te lead his flight of feur F-5ls
by the tewer, Captain Thomas Mantell pursued m large metallic
object alone after two pilots returned te Godman AFB, and finally
his wingman was ordered te return te the field, It is belimwod
that Mantell was fellowing & large, structured object not in the
flight path of а classified Navy SKTHOOK balleon, Mantell radiesd
Godman tower that he was at 27,000 feet and still climbing. At
one point Mantell said that the object had paced his aireraft for
several mimites, then would speed up, His last transmission te
the tower was, "It appears te be a metallic object , , , and it
is ef tyemendous sizo , , , It appears to be m metallic object
or pessibly the reflaction of sun from а metallie sbjaet," When
personnel arrived at the crash scene, Mantell's F-51
was feund in many pieces, not large sections as ome would find
frm а free stick deactm$ The wreckage contained unusual damage
as 1f Mantell's plane маз repeatedly hit by shetgun blasts,
Sone ef the metal had pitted surfaces and umusual scoring. All
rubber material had disintegrated im » soft powdery substance,
There was no indicatien ef gunfire damage ew feul burn, Тһе
crash site and debris exibited an unusually high ameunt of
rTadiatiemof undetermined nature, The site was cleared of debris
and cevered, Mantell's plane was subsequently sent te Wright-
Patterson AFB, Ohie for examinatiem, А autopsy was cenducted on
the body and interned in storage for future study. It is believed
by the Air Feres investigaters that Mantell's Plane had been
destreyed by a ienisatien phenom man, possibly frem tho propulsion
wash of the ebject's exhaust,
Frem 1919 te late 1950, there have been several crashes ef 5-36
^ bombers on routine artic patrol that bear all the earmarks of the
Mantell incident, None ef the crews: were feund, The atomic bombs
мего net recovered, thus creating а serieus problem fer the Air
Ferce when nuclear weapons are lost over friendly countries,
The death of tue Air lorca ceunterimtelligemos efficers in the
crash of their B-25 aireraft enreute to Hamilten AFB, Califernia,
after interviewing two auxiliary 00 men whe reported six UFOs ever
Maury Island, Washington, in June 1747. CIC agent Crisman had
spoken te Kenneth Arneld, whe on 26 June 1947, had reported а
flight of UFUs over МЕ. Rainier, Washington, and filed his report
after he had spoken te Captain Davidsen and Lieutenant Brow,
The material given to Davidson and Brown was believed to come
frem Maury Island and mày be celestrial fragments containing
metal frem a nuclear reacter frem & UFO, Fragments were turned
ever to CIA agent Shaw, and Crioman was ordered te the Alaskan
ADC for assignment in Projoct 171,
سا[
=
329 / 340
345 / 570
AMEX C (Cont ға)
7. Aerial interference with military aircraft has demenstrated the
ability to ebserve our air operatiens im war and peacetime
conditions, During the war over ЖО ncar-miss incidents мега
reported by allied pilots and crews in all theater ef operations,»
One of tha most dramatic near-miss encounters occurred on Ш
October 1943, Sth AF Missi n 115 over Schwienfurt, Germany, В-17
crews reported many fornat of silverly discs flying down iato
the B-17 fermations, Several times during the bombing missien, large
objects were seen following the discs descent into the formatiens,
Unlike previous reports, no engine failures or airframe damage was
reported. After the surrender of Masi Germany, GAF fighter pilets
were interregated by AP intelligence concerning Missien 115, Gar
did not have any aircraft above our bombers at that time,
8, On 2 August 1916, a C-l7 piloted by Captain Jack Е, Puckett,
Assistant Chier ef Flying Safety fer TAC, experienced a near-miss
of а eylindrical-shaped aircraft about 100 meters im length, The
incident eccurred at an altitude of 4,000 feet, northeast of
Tampa, Florida. Just 1,000 yards en a cellisien course, the UFO
flipped ever Sideways, cressing the flight path of Риске Из
С-17. Three other crew members ebserved the UFO and described it
аз being over twice the length of a B-29 and cylindrical in
Shape with luminated windows, Observers en the С-ЦТ reported a
9 stream ef fire trailing the ebject, The егет and Puckett watched
the UFO for ever three minutes, TAC radar statiens had tracked
а large target approaching the С-Ц7 and them Performed a right-
angle ceurse change while flying at spends ef axcesg of 600 mph,
9. On 1 October 1948, а АКО F.c] pilot engaged a blinking lunimus
UFO in a dogfight-style encounter over Farge, North Daketa,
20. On 2h April. 1919, engineers and technicians from the White
Sands Proving Greund observed a elliptically-shaped object
moving in a eastward course at very high altitude, The ob-
ject was discevered while tracking a Skyhook balloon through
a theodolite, The object appeared whitish in celor and pale
yellow at the tail end. The ebjeot was estimated to be two-
and-a-half times as long аз it was wide. It маз difficult te
seo any structure of the 9bject as it was moving at a very
high speed, The object was observed through a theodolite fer
346 / 570
330 / 340
346 / 569
т e Т
ANNEX C (Cont'a)
11. Frem 19 to carly1951, our atomic bemb and ceapenent plants
have beon the target of UFO reconnaissance. Of late, our МЕРА
projects are of special attention te the visiters, During
seme ef the flights » radiatien levels have risen sharpely,
а
then drepping suddenly to normal. In come instances lutenium
production has been halted due te contamination ef plant
personnel during these sightings ef lew-level flights.
12, ( On 25 October 1950) the Superintendent of Security, Oak Ridge,
filed a security report for I-10, Me stated that a round ebject,
about ten fect in n diameLer, burmished yellow ін color, hung lew
ever the Control Zena. The ebject would move slightly frem ono
side to tlie other and emit а low hum sound,
13. £ On 24 October 1950) the Assistant Chief of Security, NEPA
i Division, Oak Ridge » Observed a similar ebject near the
f restricted area (Restricted Fying Zone), The ebject emitted
а varying color ef light frem red to green, to blue te
orange, This sighting was confirmed by a Air Force efficer
if alse of НҰРА Divisien, Oak Ridge, Radar from Knoxville
е Airport tracked several slow moving targets flying ever the
тА Southeast seetor of the "Restricted Zone". Fighters were
К. Vectered to the radar targets but the pilot reported no _
Er
PE visual contact, _
1
|
lh, Naval aircraft with nuclear weapons delivery capability have
reported a sudden drop in nentren counters, Aircraft carrier
E storage of nuclear weapons have also reported unusual meutren
n counts. During recent MATO naval maneuvers, the USS Franklin
D, Roosevelt has been trailed by numereus UFOs Гог leng perieds
on-and-off since 1950, ;
CONCLUSIONS :
The future of American citisens and the world for that matter are
jeopardized today by developments аз pertentious as those leading
te World War II, Givén the growing challenge from the Soviet
Union and her satellites and the intrusion of extraterrestrials,
the United States is compelled, therefore, te initiate realistic
lines of actien te protect United States strategic interests.
RECOMMENDATIONS ¢
—— Ó— ——— нні
It is recemmended:
That the United States Government provide as early as practicable
meral, advisory, and material support te the MAJESTIC-12 Project
‘in order to contribute te the ‘early establishment of peace in tho
World in censonance with the enunciated principles ef the United
Nations, and to protect United States strategic interests against
ferces which now threaten them. 277
-16-
—— A а т сее ЦНИИ
347 / 569 331 / 340 347 / 570
«See rs.
348 / 569 332 / 340 348 / 570
«See rs.
349 / 569 333 / 340 349 / 570
SECUR
351/569 335 / 340 351/570
360 / 569
a» United States Patent
US006587729B2
(10) Patent No.: US 6,587,729 B2
O’Loughlin et al. (45) Date of Patent: Jul. 1, 2003
(54) APPARATUS FOR AUDIBLY (58) Field of Search ......................... 332/167; 381/151;
COMMUNICATING SPEECH USING THE 607/56, 55; 340/384.1; 600/559, 23, 586;
RADIO FREQUENCY HEARING EFFECT 128/897, 898
(75) Inventors: James P. O?Loughlin, Placitas, NM (56) References Cited
(US); Diana L. Loree, Albuquerque,
NM (US) U.S. PATENT DOCUMENTS
(73) Assignee: The United States of America as 3,563,246 А * 2/1971 Puharich et al. .............. 607/55
represented by the Secretary of the о A * — ue еи et al. .............. : эс
Ё җе ‚835, * aou!
Air Force; Washington, DC (US) 5.450044 A * 9/1995 Hulick 332/103
(*) Notice: Subject to any disclaimer, the term of this t ей by examiner
patent is extended or adjusted under 35 y
шама by 0days: Primary Examiner—Kennedy Schaetzle
(21) Appl No.: 10/131,626 (74) Attorney, Agent, оғ Firm—James M. Skorich
2 ppl. No.: m
57 ABSTRACT
(22) Filed: Apr. 24, 2002 Bg
я P A modulation process with a fully suppressed carrier and
(65) Prior Publication Data input preprocessor filtering to produce an encoded output;
US 2002/0123775 A1 Sep. 5, 2002 for amplitude modulation (AM) and audio speech prepro-
cessor filtering, intelligible subjective sound is produced
Related U.S. Application Data when the encoded signal is demodulated using the RF
Hearing Effect. Suitable forms of carrier suppressed modu-
(62) Division of application No. 08/766,687, filed on Dec. 13, lation include single sideband (SSB) and carrier suppressed
1996, now Pat. No. 6,470,214. amplitude modulation (CSAM), with both sidebands
(51) Int. Cl.^ sss H03C 1/54 present.
(52) U.S;CL en 607/55; 128/897; 332/167;
381/151; 600/586
AUDIO
PREDISTORTION
а() As (f)
11 Claims, 3 Drawing Sheets
32
SQUARE HOOT
FILTER
As (f)
(a(t) As (f)+A)
PROCESSOR
L
2
J
BALANCED
(a(t) As (0+А)2 sin (At)
1
SPHERICAL
MODULATOR
DEMODULATOR
ACOUSTIC
BRAIN
360 / 570
U.S. Patent Jul. 1, 2003 Sheet 1 of 3 US 6,587,729 B2
Signal
RF
Signal
361 / 569 361/570
362 / 569
U.S. Patent Jul. 1, 2003 Sheet 2 of 3
AUDIO
a(t) | PREDISTORTION a(t) As (f)
FILTER
As (f)
SQUARE ROOT
PROCESSOR
L
2
(a(t) As ()+А)
j
?
(a(t) As (f)+A)
BALANCED sin (2,1)
MODULATOR
SPHERICAL
DEMODULATOR
ACOUSTIC
BRAIN
на. 3
US 6,587,729 B2
362 /570
U.S. Patent Jul. 1, 2003 Sheet 3 of 3 US 6,587,729 B2
DEMODULATOF
44
43 ma
чи SPHERICAL |
4 1
/
ACOUSTIC
BRAIN
FIG.
363 / 569 363 / 570
364 / 569
US 6,587,729 B2
1
APPARATUS FOR AUDIBLY
COMMUNICATING SPEECH USING THE
RADIO FREQUENCY HEARING EFFECT
This application is a division of U.S. patent application
Ser. No. 08/766,687 filed on Dec. 13, 1996, now U.S. Pat.
No. 6,470,214, and claims the benefit of the foregoing filing
date.
The invention described herein may be manufactured and
used by or for the Government for governmental purposes
without the payment of any royalty thereon.
BACKGROUND OF THE INVENTION
This invention relates to the modulating of signals on
carriers, which are transmitted and the signals intelligibly
recovered, and more particularly, to the modulation of
speech on a carrier and the intelligible recover of the speech
by means of the Radio Frequency Hearing Effect.
The Radio Frequency (“RF”) Hearing Effect was first
noticed during World War II as a subjective “click” produced
by a pulsed radar signal when the transmitted power is above
a “threshold” level. Below the threshold level, the click
cannot be heard.
The discovery of the Radio Frequency Hearing Effect
suggested that a pulsed RF carrier could be encoded with an
amplitude modulated (“АМ”) envelope. In one approach to
pulsed carrier modulation, it was assumed that the “click” of
the pulsed carrier was similar to a data sample and could be
used to synthesize both simple and complex tones such as
speech. Although pulsed carrier modulation can induce a
subjective sensation for simple tones, it severely distorts the
complex waveforms of speech, as has been confirmed
experimentally.
The presence of this kind of distortion has prevented the 3
click process for the encoding of intelligible speech. An
example is provided by AM sampled data modulation
Upon demodulation the perceived speech signal has some
of the envelope characteristics of an audio signal. Conse-
quently a message can be recognized as speech when a
listener is pre-advised that speech has been sent. However,
if the listener does not know the content of the message, the
audio signal is unintelligible.
The attempt to use the click process to encode speech has
been based on the assumption that if simple tones can be
encoded, speech can be encoded as well, but this is not so.
A simple tone can contain several distortions and still be
perceived as a tone whereas the same degree of distortion
applied to speech renders it unintelligible.
SUMMARY OF THE INVENTION
In accomplishing the foregoing and related object the
invention uses a modulation process with a fully suppressed
carrier and pre-processor filtering of the input to produce an
encoded output. Where amplitude modulation (AM) is
employed and the pre-processor filtering is of audio speech
input, intelligible subjective sound is produced when the
encoded signal is demodulated by means of the RF Hearing
Effect. Suitable forms of carrier suppressed modulation
include single sideband (SSB) and carrier suppressed ampli-
tude modulation (CSAM), with both sidebands present.
The invention further provides for analysis of the RE
hearing phenomena based on an RF to acoustic transducer
model. Analysis of the model suggests a new modulation
process which permits the RF Hearing Effect to be used
following the transmission of encoded speech.
10
15
40
50
60
2
In accordance with one aspect of the invention the pre-
processing of an input speech signal takes place with a filter
that de-emphasizes the high frequency content of the input
speech signal. The de-emphasis can provide a signal reduc-
tion of about 40 dB (decibels) per decade. Further process-
ing of the speech signal then takes place by adding a bias
level and taking a root of the predistorted waveform. The
resultant signal is used to modulated an RF carrier in the AM
fully suppressed carrier mode, with single or double side-
bands.
The modulated RF signal is demodulated by an RF to
acoustic demodulator that produces an intelligible acoustic
replication of the original input speech.
The RF Hearing Effect is explained and analyzed as a
thermal to acoustic demodulating process. Energy absorp-
tion in a medium, such as the head, causes mechanical
expansion and contraction, and thus an acoustic signal.
When the expansion and contraction take place in the
head of an animal, the acoustic signal is passed by conduc-
tion to the inner ear where it is further processed as if it were
an acoustic signal from the outer ear.
Тһе RF to Acoustic Demodulator thus has characteristics
which permit the conversion of the RF energy input to an
acoustic output.
Accordingly, it is an object of the invention to provide a
novel technique for the intelligible encoding of signals. A
related object is to provide for the intelligible encoding of
speech.
Another object of the invention is to make use of the
Radio Frequency (“КЕ”) Hearing Effect in the intelligible
demodulation of encoded signals, including speech.
Still another object of the invention is to suitably encode
a pulsed RF carrier with an amplitude modulated (“АМ”)
envelope such that the modulation will be intelligibly
demodulated by means of the RF Hearing Effect. A related
object is to permit a message to be identified and understood
as speech when a listener does not know beforehand that the
message is speech.
Other aspects of the invention will be come apparent after
considering several illustrative embodiments, taken in con-
junction with the drawings.
DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram model of RF to Acoustic
Demodulation Process making use of the Radio Frequency
(“RF”) Hearing Effect;
FIG. 2 is a spherical demodulator and radiator having a
specific acoustic impedance for demodulation using the RF
Hearing Effect;
FIG. 3 is a diagram illustrating the overall process and
constituents of the invention; and
FIG. 4 is an illustrative circuit and wiring diagram for the
components of FIG. 3.
DETAINED DESCRIPTION OF THE
PREFERRED EMBODIMENT
With reference to the drawings, FIG. 1 illustrates the RF
to acoustic demodulation process of the invention. Ordi-
narily an acoustic signal A reaches the outer ear E of the head
H and traverses first to the inner ear I and then to the acoustic
receptors of the brain B. A modulated RF signal, however,
enters a demodulator D, which is illustratively provided by
the mass M of the brain, and is approximated, as shown in
FIG. 2, by a sphere S of radius r in the head H. The radius
364 / 570
365 / 569
US 6,587,729 B2
3
r of the sphere S is about 7 cm to make the sphere S
equivalent to about the volume of the brain B. It will be
appreciated that where the demodulator D, which can be an
external component, is not employed with the acoustic
receptors of the brain B, it can have other forms.
The sphere S, or its equivalent ellipsoid or similar solid,
absorbs RF power which causes an increase in temperature
that in turn causes an expansion and contraction which
results in an acoustic wave. As a first approximation, it is
assumed that the RF power is absorbed uniformly in the
brain. Where the demodulator D is external to the brain B,
the medium and/or RF carrier frequency can be selected to
assure sufficiently uniform absorption.
For the modulated RF signal of FIG. 1, the power
absorbed in the sphere S is proportional to the power
waveform of the modulated RF signal. The absorption rate
is characterized quantitatively in terms of the SAR (Specific
Absorption Rate) in the units of absorbed watts per kilogram
per incident watt per square centimeter.
The temperature of the sphere S is taken as following the
integrated heat input from the power waveform, i.e. the
process is approximated as being adiabatic, at least for short
term intervals on the order of a few minutes.
The radial expansion of the sphere follows temperature >
and is converted to sound pressure, p(t), determined by the
radial velocity (U,) multiplied by the real part of the specific
acoustic impedance (Z,) of the sphere, as indicated in
equation (1), below.
Z,=p.c(kr)/(1+jkr)=p;c ИЛИ.) (1)
Where:
po=density, 1000 kg/m? for water
c=speed of sound, 1560 m/s, in water @ 37? C.
k=wave number, 2z/wavelength
r=sphere radius, in meters (m)
f-audio frequency
f.=lower cutoff break Недиепсу,=с/(2лг)
j=the 90 degree phase-shift operator
The specific acoustic impedance for a sphere of 7 cm
radius, on the order of the size of the brain, has a lower
cut-off break frequency of about 3,547 Hertz (Hz) for the
parameters given for equation (1). The essential frequency
range of speech is about 300 to 3000 Hz, i.e., below the
cut-off frequency. It is therefore the Real part (R,) of Z,
times the radial particle velocity (U,) which determines the
sound pressure, p(t). The real part of Z, is given by equation
(1a), below:
RJ pac(ftf Qo 027) (1а)
In the speech spectrum, which is below the brain cut-off
frequency, the sphere S is an acoustic filter which “rolls off",
Le. decreases in amplitude at —40 dB per decade with
decreasing frequency. In addition to any other demodulation
processes to be analyzed below, the filter characteristics of
the sphere will modify the acoustic signal with a 40 dB per
decade slope in favor of the high frequencies.
Results for an AM Modulated Single Tone
Ап RF carrier with amplitude A, at frequency œw, is AM
modulated 100 percent with a single tone audio signal at
frequency œw. The voltage (time) equation of this modulated
signal is given by equation (2), below:
V(D=A. sin (o) D(1+sin (6,0) (2)
10
15
40
50
60
4
The power signal is V(t)? as given by equation (3), below:
Р(д-А.ДЗАзвіп(ө,)-% cos(205f)-34 cos(20,f)- cos(20,£)
sin(w3t)+% cos(20,t) cos(20,1)] (3)
To find the energy absorbed in the sphere, the time
integral of equation (3) is taken times absorption coefficient,
K. The result is divided by the specific heat, SH to obtain the
temperature of the sphere and then multiplied by the volume
expansion coefficient, Mv to obtain the change in volume.
Тһе change in volume is related to the change in radius by
equation (4), below:
dVIV-3drlr (4)
То obtain the amplitude of the radius change, there is
multiplication by the radius and division by three. The rms
radial surface velocity, U, is determined by multiplying the
time derivative by г and dividing Бу 2”. The result, U,, is
proportional to the power function, P(t) in equation (5),
below.
U,-0.3535 Рд КМ ДЗ5Н) (5)
Тһе acoustic pressure, p(t), is given in equation (6),
below, as the result of multiplying equation (5) by the Real
part of the specific acoustic impedance, R, (1).
I(O-RAZ,U,)-R. SU, (6)
The SPL (Sound Pressure Level) in acoustic dB, is
approximated as 20 log[p(t)/2E-5]. The standard acoustic
reference level of 2E-5 Newtons per square meter is based
on a signal in air; however, the head has a water-like
consistency. Therefore, the subjective level in acoustic dB is
only approximate, but sufficient for first order accuracy.
In a single tone case the incident RF power, P(t), from
equation (3) has two terms as shown in equation (7), below,
which are in the hearing range.
sin(o,£)-!4 cos(20,f) (7)
This is converted to the acoustic pressure wave, p(t), by
multiplying by the specific acoustic impedance calculated at
the two frequencies. Therefore, the resulting pressure wave
as indicated in equation (8), below, becomes
p(t)- C[Z.(o,)sin(o,7)—4Z „(20 )сов(2003) | (8)
Тһе result 15 an audio frequency and a second harmonic
at about 1⁄4 amplitude. Thus using an RF carrier, AM
modulated by a single tone, the pressure wave audio signal
will consist of the audio tone and a second harmonic at about
-6 dB, if the specific acoustic impedances at the two
frequencies are the same. However, from equation (1) the
break frequency of a model 7 cm sphere is 3.547 Hz. Most
of the speech spectrum is below this frequency therefore the
specific acoustic impedance is reactive and the real compo-
nent is given by equation (8a), below:
RAZ} =P (f: (Af) (8a)
Below the cutoff frequency the real part of the impedance
varies as the square of the frequency or gives a boost of 40
dB per decade. Therefore, if the input modulation signal is
1 kHz, the second harmonic will have a boost of about 4 time
in amplitude, or 12 dB, due to the variation of the real part
of the specific acoustic impedance with frequency. So the
second harmonic pressure term in equation (8) is actually
four times the power or 6 dB higher than the fundamental
365 / 570
366 / 569
US 6,587,729 B2
5
term. If the second harmonic falls above the cutoff frequency
then the boost begins to fall back to 0 dB. However, for most
of the speech spectrum there is a sever distortion and strong
boost of the high frequency distortion components.
Results for Two Tone AM Modulation Analysis
Because of the distortion attending single tone
modulation, predistortion of the modulation could be
attempted such that the resulting demodulated pressure wave
will not contain harmonic distortion. This will not work,
however, because of the non-linear cross-products of two-
tone modulation are quite different from single tone modu-
lation as shown below.
Nevertheless, two-tone modulation distortion provides an
insight for the design of a corrective process for a complex
modulation signal such as speech. The nature of the distor-
tion is defined in terms of relative amplitudes and frequen-
cies.
Equation (8b) is that of an AM modulated carrier for the
two-tone case where о); and o, are of equal amplitude and
together modulate the carrier to a maximum peak value of
100 percent. The total modulated RF signal is given by
equation (8b), below:
V(t)2A, біп(о 21-9 sin(0,,)+% зш(о 201
The square of (8b) is the power signal, which has the same
form as the particle velocity, U,(t), of equation (9), below.
From the square of (8b) the following frequencies and
relative amplitudes are obtained for the particle velocity
wave, U,(t), which are in the audio range;
U (t)-C[sin(o,,£)*sin(o, „д+М4 cos((«,,-«,,)(f) = cos((o, +
(0,5)£)- Vs cos(20,,0)- s cos(20,51)] (9)
If the frequencies in equation (9) are below the cut-off
frequency, the impedance boost correction will result in a
pressure wave with relative amplitudes given in equation
(9a), below:
p(D=C'[sin(o +b? sin(o,,t)«(1-57)/4 соғ(о,-ө, 001-924
cos((,4--«9,5)0)-34 cos(2,,)t)- 57/2 cos(20,,1) (9а)
where: b=o,.,/@,, and 0,2»0,,
Equation (9a) contains a correction factor, b, for the
specific acoustic impedance variation with frequency. The
first two terms of (9a) are the two tones of the input
modulation with the relative amplitudes modified by the
impedance correction factor. The other terms are the distor-
tion cross products which are quite different from the single
tone distortion case. In addition to the second harmonics,
there are sum and difference frequencies. From this two-tone
analysis it 15 obvious that more complex multiple tone
modulations, such as speech, will be severely distorted with
even more complicated cross-product and sum and differ-
ence components. This is not unexpected since the process
which creates the distortion is nonlinear. This leads to the
conclusion that a simple passive predistortion filter will not
work on a speech signal modulated on ап RF carrier by a
conventional AM process, because the distortion is a func-
tion of the signal by a nonlinear process.
However, the serious distortion problem can be overcome
by means of the invention which exploits the characteristics
of a different type of RF modulation process in addition to
special signal processing.
AM Modulation With Fully Suppressed Carrier for
the Intelligible Encoding of Speech by the
Invention for Compatibility With the RF Hearing
Phenomena
The equation for AM modulation with a fully suppressed
carrier is given by equation (10), below:
10
15
25
40
50
60
V(t)-a(f)sin(o,£) (10)
This modulation is commonly accomplished in hardware
by means of a circuit known as a balanced modulator, as
disclosed, for example in “Radio Engineering”, Frederick E.
Terman, р.481-3, McGraw-Hill, 1947.
Тһе power signal has the same form as the particle
velocity signal which is obtained from the square of equa-
tion (10) as shown in equation (11), below:
Р(д-С U,-a(t)/2- (a(£)/2)cos(20,1)) (11)
From inspection of equations (10) and (11) it is seen that,
if the input audio signal, a(t), is pre-processed by taking the
square root and then modulating the carrier, the audio term
in the particle velocity equation will be an exact,
undistorted, replication of the input audio signal. Since the
audio signal from a microphone is bipolar, it must be
modified by adding a very low frequency (essential d.c.) bias
term, A, such that the resultant sum, |а(О+А1>0.0, is always
positive. This is necessary in order to insure a real square
root. The use of a custom digital speech processor imple-
ments the addition of the term A, i.e. as shown in equation
(10*), below:
V(D=(a(D+A)122 sin(o,r) (10*)
The pressure wave is given by equation (11%), below:
р(@=С U,-A/2«a(t)/2- (a(0/2)cos(20,1)-(A/2)cos(2«,1) (11%)
When the second term of the pressure wave of equation
(11*) is processed through the specific acoustic impedance
it will result in the replication of the input audio signal but
will be modified by the filter characteristics of the Real part
of the specific acoustic impedance, R,{Z,(f)}, as given in
equation (8а). The first term of equation (11%) is the d.c.
bias, which is added to obtain a real square root; it will not
be audible or cause distortion. The third and fourth terms of
(11*) are a.c. terms at twice the carrier frequency and
therefore will not distort or interfere with the audio range
signal, a(t).
Since the filter characteristic of equation (7) is a linear
process in amplitude, the audio input can be predistorted
before the modulation is applied to the carrier and then the
pressure or wound wave audio signal, which is the result of
the velocity wave times the impedance function, R,{Z,(f},
will be the true replication of the original input audio signal.
A diagram illustrating the overall system 30 and process
of the invention is shown in FIG. 3. Then input signal a(t)
is applied to an Audio Predistortion Filter 31 with a filter
function As(f) to produce a signal a(t) As(f), which is applied
to a Square Root Processor 32, providing an output=(a(t)As
(D-A)'2, which goes to a balanced modulator 33. The
modulation process known as suppressed carrier, produces a
double sideband output-(a(t)As(f)2-A)'? зш(о t), where œw,
is the carrier frequency. If one of the sidebands and the
carrier are suppressed (not shown) the result is single
sideband (SSB) modulation and will function in the same
manner discussed above for the purposes of implementing
the invention. However, the AM double sideband suppressed
carrier as described is more easily implemented.
The output of the balanced modulator is applied to a
spherical demodulator 34, which recovers the input signal
a(t) that is applied to the inner ear 35 and then to the acoustic
receptors in the brain 36.
Тһе various components 31-33 of FIG. 3 are easily
implemented as shown, for example by the corresponding
components 41—42 in FIG. 4, where the Filter 41 can take
366 / 570
367 / 569
US 6,587,729 B2
7
the form of a low pass filter, such as a constant-K filter
formed by series inductor L and a shunt capacitor C. Other
low-pass filters are shown, for example, in the ITT Federal
Handbook, 4th Ed., 1949. As a result the filter output is
AS(f) a 1/2. The Root Processor 42 can be implemented by
any square-law device, such as the diode D biased by a
battery B and in series with a large impedance (resistance)
R, so that the voltage developed across the diode D is
proportional to the square root of the input voltage a(t)As(f).
Тһе balanced modulator 43, as discussed in Terman, op.cit.,
has symmetrical diodes A1 and A2 with the modulating
voltage M applied in opposite phase to the diodes A1 and A2
through an input transformer T1, with the carrier, O, applied
commonly to the diodes in the same phase, while the
modulating signal is applied to the diodes in opposite phase
so that the carrier cancels in the primary of the output
transformer Т2 and the secondary output is the desired
double side band output.
Finally the Spherical Demodulator 45 is the brain as
discussed above, or an equivalent mass that provides uni-
form expansion and contraction due to thermal effects of RF
energy.
The invention provides a new and useful encoding for
speech on an RF carrier such that the speech will be
intelligible to a human subject by means of the RF hearing
demodulation phenomena. Features of the invention include
the use of AM fully suppressed carrier modulation, the
preprocessing of an input speech signal be a compensation
filter to de-emphasize the high frequency content by 40 dB
per decade and the further processing of the audio signal by
adding a bias terms to permit the taking of the square root
of the signal before the AM suppressed carrier modulation
process.
The invention may also be implemented using the same
audio signal processing and Single Sideband (SSB) modu- 3
lation in place of AM suppressed carrier modulation. The
same signal processing may also be used on Conventional
AM modulation contains both sideband and the carrier;
however, there is a serious disadvantage. The carrier is
always present with AM modulation, even when there is no
signal. The carrier power does not contain any information
but contributes substantially to the heating of the thermal-
acoustic demodulator, i.e. the brain, which is undesirable.
The degree of this extraneous heating is more than twice the
heating caused by the signal or information power in the RF
signal. Therefore conventional AM modulation is an ineffi-
cient and poor choice compared to the double side-band
suppressed carrier and the SSB types of transmissions.
The invention further may be implemented using various
degrees of speech compression commonly used with all
types of AM modulation. Speech compression is imple-
mented by raising the level of the low amplitude portions of
the speech waveform and limiting or compressing the high
peak amplitudes of the speech waveform. Speech compres-
sion increases the average power content of the waveform
and thus loudness. Speech compression introduces some
distortion, so that a balance must be made between the
increase in distortion and the increase in loudness to obtain
the optimum result.
Another implementation is by digital signal processing of
the input signal through to the modulation of the RF carrier.
What is claimed is:
1. An apparatus for communicating an audio signal a(t),
comprising:
10
40
50
60
8
an audio predistortion filter having a filter function As(f)
for producing a first output signal a(t)As(t) from the
audio signal a(t);
means for adding a bias A to the first output signal, to
produce a second output signal a(t)As(f)+A;
a square root processor for producing a third output signal
(a(t)As(f) -A)'? responsive to the second output signal;
and
a modulator for producing a double sideband output
signal responsive to the third output signal, having a
carrier frequency of о,, and being mathematically
described by (a(t)As(f)--A)'? sin(w,t); and
transmitting the double sideband output signal to a
demodulator, whereby the audio signal a(t) is recovered
from the double sideband output signal.
2. The communication apparatus defined in claim 1
wherein:
the double sideband output signal has RF power; and
the demodulator is for converting the RF power into
acoustic pressure waves.
3. The communication apparatus defined in claim 2
wherein:
the demodulator converts the RF power into the acoustic
pressure waves by means of thermal expansion and
contraction, whereby
the acoustic pressure waves approximate the audio signal
a(t).
4. The communication apparatus defined in claim 2
wherein the demodulator includes a mass that expands and
contracts responsive to the RE power of the double sideband
output signal.
5. The communication apparatus defined in claim 4
wherein the mass is approximately spherical.
6. The communication apparatus defined in claim 1
wherein:
the double sideband output signal is comprised of a first
sideband component and a second sideband compo-
nent; and
means for suppressing the second sideband component,
whereby
the demodulator recovers the audio signal a(t) solely from
the first sideband component.
7. The communication apparatus defined in claim 1
wherein the audio predistortion filter is a low-pass filter.
8. The communication apparatus defined in claim 7
wherein the audio predistortion filter is a digital processor.
9. The communication apparatus defined in claim 1
wherein:
the square root processor is a diode biased by a voltage
source, in series with a resistance, whereby
a voltage across the diode is proportional to a square root
of the second output signal a(t)As(t)+A.
10. The communication apparatus defined in claim 1
wherein the modulator is a balanced modulator.
11. The communication apparatus defined in claim 1
wherein:
the audio signal a(t) includes a high frequency compo-
nent; and
the audio predistortion filter de-emphasizes the high fre-
quency component by approximately 40 dB per decade.
* * * * *
367 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
368 / 569 368 / 570
М
ры
WN
p
1 /
)
J
- СА Т
2 2%; є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
411 / 569 411 / 570
So what are Extraterrestrials doing here?
—Here you get a short text summary:
They fill the tanks with compressed liquid air and fresh water, dump
the contents of the sewage tank into our waterways and lakes, they
telepathically influence decisions made within Authorities and
Governments. They steal containers that contain everything from
girls' make-up to video game consoles. They conduct biological
experiments, and they have actively supported the idea of war in
Ukraine.
Now is the time to shoot them down. We dont have to put up with the
above no more.
! Д
4
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
412 / 569 412 / 570
f tte ee =
Program Acquisition
Cost By
Weapon System
UNITED STATES DEPARTMENT OF DEFENSE
FISCAL YEAR 2018 BUDGET REQUEST
414 / 569
415 / 569
The estimated cost of this report or study for the
Department of Defense is approximately $32,000
for the 2017 Fiscal Year. This includes $13,000 in
expenses and $19,000 in DoD labor.
Generated on 2017May03 ReflD: E-7DE12BO
415 / 570
416 / 569
Numbers may not add due to rounding
FY 2018 Program Acquisition Cost by Weapon System
Major Weapon Systems
OVERVIEW
The combined capabilities and performance of United States (U.S.) weapon systems are
unmatched throughout the world, ensuring that U.S. military forces have the advantage
over any adversary. The Fiscal Year (FY) 2018 acquisition funding request for the
Department of Defense (DoD) budget totals $208.6 billion, which includes base
funding and Overseas Contingency Operations (OCO) funding; $125.2 billion for
Procurement funded programs and $83.3 billion for Research, Development, Test, and
Evaluation (RDT&E) funded programs. Of the $208.6 billion, $94.9 billion is for
programs that have been designated as Major Defense Acquisition Programs (MDAPs).
This book focuses on all funding for the key MDAP programs. To simplify the display of
the various weapon systems, this book is organized by the following mission area
categories:
Mission Area Categories
* Aircraft & Related Systems * Missiles and Munitions
* Command, Control, Communications, * Mission Support Activities
Computers, and Intelligence (C4l) Systems ° RDT&E Science & Technology
* Ground Systems * Shipbuilding and Maritime Systems
* Missile Defense Programs * Space Based Systems
FY 2018 Modernization - Total: $208.6 Billion
($ in Billions)
Space Based Aircraft &
Systems Related
$9.8 Systems
Shipbuilding & $49.9 c 4l Systems
Maritime $8.6
Systems Ground
$30.4 Systems
| $11.2
RDT&E S&T — Missile Defense
$13.2 Programs
$9.2
e Missiles &
Mission Support Munitions
Activities $16.4
$59.9
416 / 570
417 / 569
FY 2018 Program Acquisition Cost by Weapon System
THE DISTRIBUTION OF FUNDING IN FY 2018 FOR PROCUREMENT AND
RDT&E, BY COMPONENT AND BY CATEGORY *
(Dollars in Billions)
$70
г Space Based Systems
$60
B Shipbuilding
$50 п RDT&E S&T
$40 = Missiles/Munitions
E Missile Defense
$30
= Ground Systems
$20 ш CAI Systems
$10 B Aircraft
Army Navy Air Force Def-Wide
$50
$45 wi
$40 E
$35 pil
Йя p Po uid
8 ______ АЛ. К
МЕ pr Pi- I i а
$10 ИЕ
ЧЕ 29993929
$0 „ЖУ "P ep OD uw ua
%. о © е o < % о
` < xe "i oe a «Я SS "i
v КУ Fd e S کي $ $
Ж А) ғ е КЫ
© 59 2% <
e 2 3
+ е
<
* Does пої include Mission Support costs
Numbers may not add due to rounding
417 / 570
FY 2018 Program Acquisition Cost by Weapon System
TOTAL REQUESTED PROCUREMENT AND RDT&E FUNDING DURING
FY 2018, FOR MDAP AND NON-MDAP PROGRAMS
(Dollars in Billions)
MDAP (45.5%)
Non-MDAP (54.5%) $94.9
$113.7
E MDAP
LJ NON-MDAP
The FY 2018 President’s budget request for modernization in the RDT&E and
Procurement titles is comprised of 1,927 Program, Project, and Activity (PPA) line items,
a portion of which finances the development and procurement of Major Defense
Acquisition Programs (MDAPs). Many MDAP programs (Acquisition Category (АСАТ) 1)
are not represented in this booklet because they fall below reporting criteria.
The purpose of the above chart is to illustrate the share in funding allotted to the MDAP,
and the non-MDAP efforts. While non-MDAP individual programs are smaller in dollar
value, they are essential to developing future technologies and procuring a wide
assortment of equipment, munitions, vehicles, and weapons. The MDAP programs
consume approximately $94.9 billion, or 46 percent of the FY 2018 modernization
funding ($208.6 billion).
Numbers may not add due to rounding
418 / 569 418 /570
419 / 569
FY 2018 Program Acquisition Cost by Weapon System
FY 2018 FUNDING REQUEST FOR BASE BUDGET & OVERSEAS
CONTINGENCY OPERATIONS (OCO)*
(Dollars Represented by Percent)
100%
90% т Space Based Systems
ш Shipbuilding
| RDT&E S&T
_ Missiles & Munitions
80%
70%
60%
50%
ш Missile Defense
40%
m Ground Systems
3096
E СА! Systems
m Aircraft
2096
1096
096
OCO
The FY 2018 President's Budget for Investment accounts (Research, Development,
Test, and Evaluation (RDT&E) and Procurement) totals $208.6 billion, of which
$197.7 billion is requested in the Base budget, and $10.9 billion is requested in the
OCO.
The above graph illustrates the differences in content between the Base and OCO
budget requests as a percent of funding in each request. Not surprisingly, the OCO
finances a larger percent of missiles and munitions (yellow) and ground systems
(orange) than the Base request (63 percent vs. |7 percent). These ОСО funds will be
used to replenish munitions that were expended in training or combat operations, or
to replace military equipment that, due to combat operations, were damaged or not
economical to repair. Also these funds procure critical preferred munitions, which are
required to increase inventories that are low due to sustained combat operations.
In the OCO budget the Department is requesting $397.4 million for the procurement
of 45 aircraft that were lost or damaged beyond repair in combat operations. Іп
contrast, in the Base budget the Department is procuring various aircraft for
modernization.
419 / 570
420 / 569
Major Weapon Systems Summary Base осо Total
($ in Millions) РУ 2016 FY2017 Budget Budget Request Page
Aircraft and Related Systems - Joint Service
MQ-IB / MQ-IC Predator/Gray Eagle 490.1 308.1 45.7 128.7 174.4 1-2
МО-9 Кеарег 1,034.5 1,053.1 662.5 347.3 1,009.8 1-3
RQ-4 / MQ-4C Global Hawk/Triton/ NATO AGS 1,448.2 1,213.6 1,282.3 - 1,282.3 1-4
КО-7/КО-11/ RO-20/RO-21 Shadow, Raven, Рита, and Blackjack 281.9 5224 117.4 12.3 129.7 1-5
С-130) Hercules 2,361.9 1,839.1 886.1 - 886.1 1-6
Е-35 Joint Strike Fighter 11,560.4 11,323.9 10,837.9 - 10,837.9 1-7
у-22 Osprey 1,667.6 1,822.4 961.8 - 961.8 1-8
Aircraft and Related Systems - US Army (USA)
AH-64E Apache: Remanufacture/New Build 1416.0 1840.4 1402.9 39 1441.9 1-9
СН-47 Chinook 1,135.0 656.8 415.0 - 415.0 1-10
UH-60 Black Hawk 1,765.8 1,352.3 1,059.0 - 1,059.0 1-11
Aircraft and Related Systems - US Navy (USN) / US Marine Corps (USMC)
E2D Advanced Hawkeye 1,244.0 1,399.6 1,116.4 - 1,116.4 1-12
H-I AH-IZ Viper/ UH-IY Venom 866.9 844.4 781.8 - 781.8 1-13
P-8A Poseidon 3,458.8 3,267.4 1,609.4 - 1,609.4 1-14
CH-53K Heavy Lift Replacement Helicopter 604.5 841.8 1,055.5 - 1,055.5 1-15
VH-92A Presidential Helicopter 490.8 338.4 451.9 - 451.9 1-16
F/A-18 Super Hornet 350.0 2,504.9 1,253.1 - 1,253.1 1-17
Aircraft and Related Systems - US Air Force (USAF)
PAR Presidential Aircraft Recapitalization 82.4 351.2 434.1 - 434.1 1-18
LRS Long Range Strike 1,455.6 2,241.7 2,945.4 - 2,945.4 1-19
F-22 Raptor 518.5 704.4 915.5 - 915.5 1-20
KC-46A Tanker 2,959.7 3,318.5 3,052.9 - 3,052.9 1-21
F-15 Eagle 1,002.5 768.5 963.1 - 963.1 1-22
CRH Combat Rescue Helicopter 150.3 319.3 354.5 - 354.5 1-23
C4I Systems - USA
WIN-T Warfighter Information Network — 778.1 461.9 449.1 - 449.1 2-2
Tactical
HMS Handheld, Manpack, and Small Form Fit 59.1 292.4 375.5 - 375.5 2-3
Radios
Ground Systems - Joint Service
ту Joint Light Tactical Vehicle 366.2 775.8 1,141.6 ІМ 1,142.7 3-2
Ground Systems - USA
AMPV Armored Multi-Purpose Vehicle 213.0 1842 393.5 253.9 647.4 3-3
FHTV Family Of Heavy Tactical Vehicles 30.8 57.1 92.1 25.9 118.0 3-4
M-I Abrams Tank Modification/Upgrades 504.7 898.7 632.4 581.5 1,213.9 3-5
РІМ Paladin Integrated Management 410.3 636.0 652.5 125.7 778.2 3-6
FMTV Family of Medium Tactical Vehicles 334.0 352.8 84.7 - 84.7 3-7
Stryker Stryker 1,191.0 735.4 178.2 - 178.2 3-8
Ground Systems - USMC
ACV Amphibious Combat Vehicle 197.0 158.7 340.5 - 340.5 3-9
Missile Defense Programs - Joint Service
AEGIS AEGIS Ballistic Missile Defense 1,594.7 1,568.0 1,610.6 - 1,610.6 4-2
THAAD Terminal High Altitude Area Defense 666.6 793.1 718.0 - 718.0 4-3
GMD Ground-based Midcourse Defense 1,598.0 1,192.7 1,370.4 - 1,370.4 4-4
2018
420 / 570
421 / 569
Major Weapon Systems Summary Base ОСО Total
($ in Millions) РУ 2016 FY2017 Budget Budget Request Page
Missile Defense Programs - USA
Patriot/PAC-3 Patriot Advanced Capability 363.0 543.0 515.1 - 515.1 4-5
PAC-3/MSE Missile PAC-3/Missile Segment Enhancement 517.1 702.0 459.0 - 459.0 4-6
Missile
Missiles and Munitions - Joint Service
AMRAAM Advanced Medium Range Air-to-Air 645.4 661.7 594.4 - 594.4 5-2
Missile
AIM-9X Air Intercept Missile - 9X 396.2 326.3 296.2 - 296.2 5-3
Chem-Demil Chemical Demilitarization 699.8 825.5 961.7 - 961.7 5-4
JASSM Joint Air-to-Surface Standoff Missile 435.6 462.0 471.7 - 471.7 5-5
JDAM Joint Direct Attack Munition 565.3 778.9 376.8 497.5 874.3 5-6
SDB Small Diameter Bomb 222.1 4232 413.2 90.9 504.1 5-7
Hellfire Hellfire Missiles 784.0 685.5 129.7 584.2 713.9 5-8
Missiles and Munitions - USA
Javelin Javelin Advanced Anti-Tank Weapon 231.1 292.9 172.4 10.9 183.3 5-9
GMLRS Guided Multiple Launch Rocket System 287.1 440.6 698.0 191.5 889.5 5-10
Missiles and Munitions - USN
RAM Rolling Airframe Missile 99.2 113.7 99.8 - 99.8 5-11
Standard Standard Family of Missiles 545.7 669.2 684.5 35.2 719.7 5-12
Tomahawk Tactical Tomahawk Cruise Missile 299.3 403.1 281.5 100.1 381.6 5-13
Trident Il Trident II Ballistic Missile Modification 1,182.5 1,237.1 1,270.0 - 1,270.0 5-14
OASUW Offensive Anti-Surface Weapon 348.7 341.5 432.5 - 432.5 5-15
Missiles and Munitions - USAF
GBSD Ground Based Strategic Deterrent 65.0 113.9 215.7 - 215.7 5-16
LRSO Long Range Stand-Off Missile 16.1 95.6 451.3 - 451.3 5-17
В6! B61 Tail Ки Assembly 204.4 137.9 179.5 - 179.5 5-18
Shipbuilding and Maritime Systems - USN
T-AO 205 John Lewis Class Fleet Replenishment 674.1 74.2 543.1 - 543.1 6-2
Oiler
CVN 78 Gerald R. Ford Class Nuclear Aircraft 2,768.7 2,791.1 4,638.1 - 4,638.1 6-3
Carrier
DDG 5I Arleigh Burke Class Destroyer 4,540.5 3,498.3 4,013.7 - 4,013.7 6-4
LCS Littoral Combat Ship 1,816.7 1,598.9 1,152.6 - 1,152.6 6-5
SSN 774 Virginia Class Submarine 5,729.5 5,322.3 5,546.3 - 5,546.3 6-6
SSC Ship to Shore Connector 218.4 139.2 245.1 - 245.1 6-7
SSBN 826 Columbia Class Submarine 1,367.1 1,864.3 1,884.5 - 1,884.5 6-8
CVN Refueling Complex Overhaul 672.6 1,991.8 1,680.8 - 1,680.8 6-9
LHA America Class Amphibious Assault Ship 497.5 1,648.2 1,748.3 - 1,748.3 6-10
Space Based Systems - USAF
AEHF Advanced Extremely High Frequency 535.5 904.7 202.6 - 202.6 7-2
EELV Evolved Expendable Launch Vehicle 1,475.8 1,803.0 1,861.5 - 1,861.5 7-3
GPS Global Positioning System 833.1 1,004.7 1,104.2 - 1,104.2 7-4
SBIRS Space Based Infrared System 834.2 581.3 1,425.3 - 1,425.3 7-5
2018
421 / 570
422 / 569
FY 2018 Program Acquisition Costs by Weapon System
Aircraft & Related Systems
Aviation forces - including fighter/attack, bomber, mobility (cargo/tanker), and specialized
support aircraft, and unmanned aircraft systems — provide a versatile strike force
capable of rapid deployment worldwide. These forces can quickly gain and sustain air
dominance over regional aggressors, permitting rapid attacks on enemy targets while
providing security to exploit the air for logistics, command and control, intelligence, and
other functions. Fighter/attack aircraft operate from both land bases and aircraft
carriers to provide air superiority to combat enemy fighters and attack ground and ship
targets. Bombers provide an intercontinental capability to rapidly strike surface targets.
The specialized aircraft supporting conventional operations perform functions such as
intelligence, surveillance, and reconnaissance; airborne warning and control; air battle
management; suppression of enemy air defenses; and combat search and rescue. In
addition to these forces, the U.S. military operates a variety of air mobility forces
including cargo, aerial-refueling aircraft, helicopters, and support aircraft.
The FY 2018 Base and OCO funding provides for the procurement of 70 F-35 jets,
29 logistics support aircraft, 198 helicopters, and 50 Unmanned Aerial Vehicles (UAV). In
addition, the funding in this category provides for the development of aircraft related
technology, the procurement of aerospace equipment and systems, various modifications
to existing aircraft, and the procurement of initial spares.
FY 2018 Aircraft & Related Systems - Total: $49.9 Billion
Aircraft ($ in Billions)
Modification Aircraft Support
: $7.8 $7.0
Unmanned Aerial
Vehicle
$2.8
Cargo Aircraft
Technology
$3.8
Development
$2.6
Support Aircraft
$4.9 Combat Aircraft
$21.0
Numbers may not add due to rounding AIRCRAFT & RELATED SYSTEMS
1-1
422 / 570
423 / 569
FY 2018 Program Acquisition Costs by Weapon System
МО-ІВ Predator / MQ-IC Gray Eagle
The U.S. Air Force (USAF) МО-ІВ Predator and the ڪڪ
Army МО-ІС Gray Eagle Unmanned Aircraft au В.
Systems (UAS) are comprised of aircraft configured я
with а multi-spectral targeting systems (electro-
optical, infra-red (IR), laser designator, and IR س
illuminator) providing real-time full motion video, weapons, data links, and ground control
stations with communications equipment providing line-of-sight and beyond-line-of-sight
control. Both systems include single-engine, propeller-driven unmanned aircraft. Special
Operations Command (SOCOM) divested the МО-І UAS in FY 2015, and the Air Force is in
the process of divesting the МО-І and replacing all aircraft with МО-9 Reapers. The МО-ІС
Gray Eagle includes the Gray Eagle Extended Range Engineering Change Proposal (ECP), which
extends the range and endurance of the aircraft.
US Army Photo
Mission: Operates over-the-horizon at medium altitude for long endurance and provides real-
time intelligence, surveillance, reconnaissance (ISR), target acquisition, and strike capability to
aggressively prosecute time-sensitive targets. Тһе Army МО-| С Gray Eagle also adds а
Synthetic Aperture Radar (SAR) Ground Moving Target Indicator (GMTI), a communications
relay capability, a heavy fuel engine, encrypted tactical common data link, and greater weapons
capability.
FY 2018 Program: Funds Test & Evaluation efforts associated with the МО-| Gray Eagle
Extended Range ECP. The Army plans to procure 11 UAS in FY 2018, which is the last planned
year of procurement for the МО-ІС Gray Eagle.
Prime Contractor: General Atomics-Aeronautical Systems Incorporated; San Diego, CA
МО-ІВ Predator / MQ-IC Gray Eagle
FY 2016* FY 2017** pce
Base Budget 00 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E
Gray Eagle USA 223 - 31.0 - 9.6 - - - 9.6 -
Procurement - -
Predator USAF 32 - - - - - - - - -
Gray Eagle USA 402.1 20 211.1 В 36.1 2 128.7 9 164.8 II
SOCOM 1.9 - - - -
Subtotal 461.8 % | Т з 36.1 2 1287 9 1848001
Total 490.1 20 30811 В 45.7 2 1281 9 1744 II
Note: Funding includes air vehicles, payloads and modifications
* FY 2016 includes actuals for Base and OCO
** FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
AIRCRAFT & RELATED SYSTEMS
Numbers may not add due to rounding
1-2
423 / 570
424 / 569
FY 2018 Program Acquisition Costs by Weapon System
MQ-9 Reaper
The U.S. Air Force MQ-9 Reaper Unmanned
Aircraft System (UAS) Program is comprised USAF Photo
of an aircraft segment consisting of aircraft
configured with an array of sensors to
include day/night Full Motion Video (FMV),
Signals Intelligence (SIGINT), and Synthetic
Aperture Radar (SAR) sensor payloads, avionics, data links and weapons; a Ground
control segment consisting of a Launch and Recovery Element, and a Mission Control
Element with embedded Line-of-Sight and Beyond-Line-of-Sight communications equipment.
The Reaper is a single-engine, turbo-prop, remotely piloted armed reconnaissance aircraft
designed to operate over-the-horizon at medium altitude for long endurance. Funding for U.S.
Special Operations Command (USSOCOM) procures Special Operations Force (SOF)-unique
kits, payloads and modifications.
Mission: Provides reconnaissance and embedded strike capability against time-critical targets.
FY 2018 Program: Funds the continued development, transformation and fielding of Reaper
aircraft and ground stations. The base request includes the procurement of 10 dual ground
control stations, and continues the modification of MQ-9s to the extended range configuration.
The OCO request includes the procurement of 32 additional aircraft, updated multi-spectral
sensors, and payload modifications.
Prime Contractor: General Atomics-Aeronautical Systems Incorporated; San Diego, CA
MQ-9 Reaper
FY 2016* FY 2017** E 2018
Base Budget OCO Budget Total Request
М Qty м Qy м Qy Мо Qy м №
RDT&E
USAF 1247 5 151.4 - | 4 Н Е - W4 я
SOCOM 214 Е 178 : 313 Е я 37.9 +
Subtotal — 146.1 - 161 - | 2393 Е Р - 0393 Е
Procurement - - - -
USAF 8712 3 829.6 24 | 3818 - 375 16 109.3 16
SOCOM 112 s 543 ще Е 193 Е 61.2 :
Subtotal 888.4 j 8839 24 4232 - 3473 16 710.5 16
Total 1,034.5 33 105. 24 | 662.5 - 3413 lN 1,009.8 16
Note: Procurement funding includes mods, spares and other Numbers may not add due to rounding
* FY 2016 includes actuals for Base and OCO
** FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-3
424 / 570
425 / 569
FY 2018 Program Acquisition Costs by Weapon System
RQ-4 Global Hawk / MQ-4C Triton / NATO AGS КЕ
pe
The U.S. Air Force (USAF) RQ-4 Global Hawk,
Navy MQ-4C Triton, and NATO
Alliance Ground Surveillance (AGS)
Unmanned Aircraft System
programs provide high altitude
long endurance Intelligence,
Surveillance, and Reconnaissance (ISR)
capabilities. Тһе RQ-4 Block 30 includes a multi-intelligence suite for imagery and signals
intelligence collection, and the Block 40 includes multi-platform radar technology for synthetic
aperture radar (SAR) imaging and moving target detection. The final three RQ-4 Block 30 aircraft
will be delivered in FY 2017 and the production line is scheduled to shut down in FY 2018. The
МО-4С will provide the Navy with a persistent maritime ISR capability. Mission systems include
inverse SAR, Electro-optical/Infra-red Full Motion Video (ЕМУ), maritime moving target detection,
Electronic Support Measures (ESM), Automatic Identification System (AIS), a basic communications
relay capability, and Link-16. Five NATO AGS aircraft are being procured with development
funding; two will deliver in FY 2017 and deliveries will complete in FY 2018.
Mission: The USAF and NATO AGS RQ-4 systems perform high-altitude, near-real-time, high-
resolution ISR collection, while the MQ-4C provides persistent maritime ISR. Both USAF and Navy
systems support Combatant Commander requirements, while the MQ-4C also supports the
numbered Fleet commanders from five worldwide sites.
FY 2018 Program: RQ-4: Funds the development and modification efforts for the Block 30,
Block 40, Airborne Signals Intelligence Payload (ASIP) Increment Il, various sensor enhancements;
and the U.S. contribution to the NATO AGS. MQ-4C: Funds the procurement of three Low Rate
Initial Production (LRIP) systems, and continues to fund development activities associated with
software upgrades and the multi-intelligence effort.
Prime Contractor: Northrop Grumman; Rancho Bernardo, CA
RQ-4 Global Hawk / MQ-4C Triton / NATO AGS
FY 201 6* FY 2017** да
Base Budget OCO Budget Total Request
ым у м (0. и оу м оу $M 05
RDT&E
RQ-4, USAF 180.5 - 2563 - 2149 - - - 214.9 -
RQ-4, NATO 131.9 - 38.9 - 441 - - - 441 -
MQ-4, USN 351.0 - 293.0 313.5 - - - 313.5 -
Subtotal — 6694 - 5882 - | 8n. - : - ا53 Sel
Procurement
RQ-4, USAF 55.1 - 46.2 - 129 - - - 12.9 -
MQ-4, USN 1231 4 579.2 2 6363 3 - - 636.3 3
Subtotal — 778.8 4654 2 109.2 3 - - 109.2 3
Total 1,448.2 4 1,213.6 2 1,282.3 3 - - 1,282.3 3
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
x FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
425 / 570
426 / 569
FY 2018 Program Acquisition Costs by Weapon System
Small Tactical Unmanned Aircraft Systems
The RQ-7 Shadow, RQ-11 Raven, КО-20 Puma, and
RQ-21 Blackjack Unmanned Aircraft Systems
(UAS) provide organic Reconnaissance,
Surveillance, Target Acquisition (RSTA)
capabilities and are embedded in maneuver
formations capable of providing crucial
information to the ground commander.
Mission: The Army/USMC КО-7
Shadow and Navy/USMC RQ-21 Blackjack provide
the tactical maneuver commander near real-time RSTA
and force protection during day/night and limited adverse
weather conditions. The Army/USMC/SOCOM multi-sensor
КО-ІІ Raven and USMC/SOCOM КО-20 Puma provides an "over-the-hill" rucksack-portable,
day/night, limited adverse weather, remotely-operated capability that supports selected combat
and combat support units. The multi-sensor КО-21 Blackjack is runway independent, requiring
minimal space for takeoff and recovery from an unimproved expeditionary/urban environment,
as well as from the decks of Navy ships.
Shadow
US Army Photo
Blackjack
Navy Photo
FY 2018 Program: Funds upgrades to system hardware and payloads for the КО-7 Shadow.
Procures upgrades and provides training and contractor logistics support for the RQ-I1 Raven.
Procures RQ-20 Puma systems for the USMC and SOCOM. Procures a total of 4 systems and
provides contractor logistics support for the RQ-21 Blackjack.
Prime Contractors: RQ-7: Textron Systems Unmanned Systems; Hunt Valley, МО
КО-20/КО-ІІ: AeroVironment, Incorporated; Simi Valley, СА
КО-21: INSITU, Incorporated; Bingen, WA
RQ-7 Shadow / КО-ІІ Raven / RQ-20 Puma / RQ-21 Blackjack
FY 2016* FY 2017** — U ааа ааа
Base Budget OCO Budget Total Request
шш шалық )уүу/ dd o 0
RDT&E 24.8 - 233 - 285 - - 28.5
Procurement
Shadow/Raven (Army) 812 - 320.6 - - - - - -
Shadow/Puma (USMC) 13.4 - 193 - 102 - - - 10.2
Puma (SOCOM) 213 : ES
Blackjack (Navy) 513 3 10.0 4 0.9 - 39 - 4.8 -
Blackjack (USMC) 113 3 89.2 4 118 4 84 - 86.2 4
Subtotal 814 6 4991 8 | 989 4 123 - 102 4.
Total 281.9 6 524 8 117.4 4 12.3 - 129.7 4
Note: RDT&E funding is for all three systems across the Army, USMC and SOCOM Numbers may not add due to rounding
* FY 2016 includes actuals for Base and OCO funding
** FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
AIRCRAFT & RELATED SYSTEMS
1-5
426 / 570
427 / 569
FY 2018 Program Acquisition Costs by Weapon System
C-130J Hercules
The C-130J Hercules is a medium-sized tactical
transport airlift aircraft that is modernizing the U.S.
tactical airlift capability. It is capable of performing a
variety of combat delivery (tactical airlift) operations
across a broad range of mission environments including
deployment and redeployment of troops and/or
supplies within/between command areas in a theater
of operation, aeromedical evacuation, air logistics support,
and augmentation of strategic airlift forces. The C-130] aircraft, with its extended fuselage,
provides additional cargo carrying capacity for the Air Force combat delivery mission compared
to the legacy C-130E/H and the С-130) (short) aircraft. Special mission variants of the С-130]
conduct airborne psychological operations (EC-130]), weather reconnaissance (УУС-130)),
search and rescue (НС-130)), and special operations (МС-130) and АС-130]). The КС-130)
provides the Marine Corps with air-to-air refueling/tactical transport capability; airborne radio
relay; intelligence, surveillance, and reconnaissance; and close air support to replace the KC-
130 F/R/T aircraft.
/
Mission: Provides responsive air movement and delivery of combat troops/supplies directly
into objective areas through air landing, extraction, and airdrop, and the air logistic support of
theater forces.
FY 2018 Program: Continues the Multiyear Procurement (MYP) for С-130) aircraft from
FY 2014 to FY 2018, procuring 9 aircraft in FY 2018.
Prime Contractor: Lockheed Martin Corporation; Marietta, GA
C-130J Hercules
FY 2016* FY 2017** RE
Base Budget OCO Budget Total Request
$M оу $M Qty $M Qty $M Qty $M оу
RDT&E
HC/MC-130 8.6 - 14.0 - 38.6 - - - 38.6 -
C130) 314 З 16.8 | 26.8 26.8 :
Subtotal 40.1 - 30.8 - 65.4 - - - 65.4 -
Procurement
C-130J 850.6 14 218.7 3 57.7 - - - 57.1 -
HC/MC-130 1,261.8 13 1,435.9 14 607.9 1 607.9 1
Subtotal 2,112.4 27 1,654.6 17 665.6 7 - - 665.6 1
Procurement
KC-130J 209.5 2 153.7 2 155.1 2 - - 155.1 2
Subtotal 209.5 22 1537 2 155. 2 : : 155.1 2
Total 2,361.9 29 1,839.1 19 886.1 9 - - 886.1 9
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-6
427 / 570
428 / 569
FY 2018 Program Acquisition Costs by Weapon System
F-35 Joint Strike Fighter
The F-35 Joint Strike Fighter (JSF) is the
next-generation strike fighter for the
Navy, Marine Corps, Air Force, and U.S.
Allies. The F-35 consists of three variants:
the F-35A Conventional Take-Off and Landing (CTOL),
the F-35B Short Take-Off and Vertical Landing (STOVL),
and the F-35C Carrier variant (CV). The F-35A CTOL
replaces the Air Force F-16 and А-10 aircraft and complements
the F-22 aircraft; the F-35B STOVL aircraft replaces the Marine Corps AV-8B aircraft and
F/A-18A/C/D aircraft; the F-35C CV aircraft complements the Р/А-|8Е/Е aircraft for the Navy,
and will also be flown by the Marine Corps. The F-35 program is a joint, multi-national
program among the United States (U.S.) Navy and Marine Corps, the U.S. Air Force, and eight
cooperative international partners, as well as three Foreign Military Sales (FMS) countries. The
Marine Corps and the Air Force declared Initial Operational Capability in July 2015 and
August 2016, respectively. The final assembly of F-35 aircraft for the U.S. is at Air Force
Plant 4, Fort Worth, Texas.
mamas
Mission: Provides all-weather, precision, stealthy, air-to-air, and ground strike capability,
including direct attack оп the most lethal surface-to-air missiles and air defenses.
FY 2018 Program: Continues development of the air system, F135 single engine propulsion
system, and conducts systems engineering, development and operational testing, and supports
Follow-on Modernization. Procures a total of 70 aircraft 46 CTOL for the Air Force,
20 STOVL for the Marine Corps, and 4 CV for the Navy in FY 2018.
Prime Contractors: Lockheed Martin Corporation; Fort Worth, TX
Pratt & Whitney; Hartford, CT
F-35 Joint Strike Fighter
FY 2016* FY 2017** = aes —
Base Budget OCO Budget Total Request
$M Qty st Qty st Qty s Qty $M Qty
RDT&E j
USN 1,055.7 Е 1,197.8 š 550.7 ` : - 550.7
USAF 621.9 Е 603.5 я 621.5 - - - 627.5
Subtotal 1,683.6 - | L801.3 - | 1,178.22 : 2 : 1,178.2
Procurement
USN 3,685.5 21 3,306.8 20 3,123.1 24 Е - 4n 24
USAF 5,190.2 41 55111 48 5,393.3 m - - 05390933 46
Subtotal 9,415.8 68 | 8,884.5 ТЕ 9169. ПИ : - 916% и
$раге$ 401.1 - 638.1 - 542.8 542.8 -
Total 11,5604 68 | ЕТЕК 68 | 10,837.9 10 - 10,831.? 10
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-7
428 / 570
429 / 569
FY 2018 Program Acquisition Costs by Weapon System
V-22 Osprey
The V-22 Osprey is a tilt-rotor, vertical
takeoff and landing aircraft designed to
meet the amphibious/vertical assault needs
of the Marine Corps, the strike rescue and
Carrier Onboard Delivery (COD)
needs of the Navy, and the long range special
operations forces (SOF) missions for U.S.
Special Operations Command (SOCOM).
The aircraft is designed to fly 2,100 miles
with one in-flight refueling, giving the Services
the advantage of a vertical and/or short
takeoff and landing aircraft that can rapidly
self-deploy to any location in the world.
Mission: Conducts airborne assault, vertical lift, combat search and rescue, and special operations
missions. The new CMV-22 variant will replace the Navy’s C-2A Greyhound for the COD mission.
FY 2018 Program: Funds the first year of a follow-on 7-year multiyear procurement contract
(FY 2018 to 2024), procuring 6 CMV-22 aircraft for the Navy.
Prime Contractors: Bell Helicopter Textron, Incorporated; Fort Worth, TX
The Boeing Company; Philadelphia, PA
V-22 Osprey
FY 2016* FY 2017** Ее
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E
USN 143 - 1894 - 171.4 - - - ИЯ -
USAF 26.8 - 28.7 - 22.5 - - - 22.5 -
Subtotal 101.1 - 218.1 - 193.9 - - - 193.9 -
Procurement
USN 1,440.7 19 1,540.0 19 106.1 6 - - 106.1 6
USAF 125.8 | 643 - 612 - - - 612 -
Subtotal 1,567 20 1,043 19 161.9 6 - - 1619 6
USN Subtotal 1,515.0 19 1,7294 19 878.1 6 - - 878.1 6
USAF Subtotal 152.6 | 93.0 - 83.7 - - - 83.7
Total 1,667.6 20 1,822.4 19 961.8 6 - - 961.8 6
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
AIRCRAFT & RELATED SYSTEMS
1-8
429 / 570
430 / 569
FY 2018 Program Acquisition Costs by Weapon System
AH-64E Apache
The AH-64E Apache program is a parallel new build and remanufacture effort,
which integrates a mast-mounted fire control radar
into an upgraded and enhanced АН-64 airframe.
The remanufacture effort results in a
zero-time Longbow Apache,
which restarts its service
life and upgrades the aircraft
with updated technologies and
performance enhancements to
keep the Apache viable throughout
its lifecycle. The AH-64E program also
installs the Target Acquisition
Designation Sight and Pilot Night Vision Sensors, plus other safety and reliability enhancements.
US Army Photo
Mission: Conducts armed reconnaissance, close combat, mobile strike, and vertical maneuver
missions in day, night, obscured battlefield, and adverse weather conditions.
FY 2018 Program: Funds the remanufacture of 48 AH-64D aircraft to the AH-64E
configuration and 13 New Build AH-64Es in the second year of a 5-year multiyear procurement
(MYP) contract (FY 2017 — FY 2021) and continued development of upgrades to enhance
operational capabilities. Procures two AH-64E aircraft in the Overseas Contingency Operations
request.
Prime Contractors: Apache: The Boeing Company; Mesa, AZ
Integration: Northrop Grumman Corporation; Baltimore, MD
Lockheed Martin Corporation; Oswego, NY
AH-64E Apache
FY 2016* FY 2017** Bu.
Base Budget OCO Budget Total Request
$M Qty $M Qty | $M Qty $M Qty $M Qty
RDT&E 63.0 - 664 - 60.0 - - - 60.0
Procurement
AH-64E New Build - - 107.8 20 4460 13 - - 446.0 13
AH-64E Reman 1,353.0 64 1,066.2 52 896.9 48 39.0 2 935.9 50
Total 1,416.0 64 1,840.4 n 1,402.9 6l 39.0 2 1,441.9 63
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
AIRCRAFT & RELATED SYSTEMS
1-9
430 / 570
431 / 569
FY 2018 Program Acquisition Costs by Weapon System
CH-47 Chinook
The CH-47F Improved Cargo Helicopter program
procures new and remanufactured
Service Life Extension Program (SLEP)
CH-47F helicopters.
The aircraft includes an
upgraded digital cockpit
and modifications to the airframe
to reduce vibration. The upgraded
cockpit includes a digital data bus that
permits installation of enhanced
communications and navigation equipment
for improved situational awareness, mission performance,
and survivability. The new aircraft uses more powerful T55-GA-714A engines that improve fuel
efficiency and enhance lift performance. These aircraft are fielded to heavy helicopter
companies (CH-47F) and Special Operations Aviation (MH-47G). The CH-47F is expected to
remain the Army's heavy lift helicopter until the late 2030s. Recapitalization of the MH-47G
airframes is required to extend the useful life of legacy aircraft. The CH-47F Block Il
development effort entered Engineering and Manufacturing Development in FY 2017.
Improvements include increased lift, improved engine control, upgraded drive train components
and advanced flight controls. New Build CH-47Fs will continue at a low rate until production of
the CH-47F Block Il in FY 2021.
Mission: Transports ground forces, supplies, ammunition, and other battle-critical cargo in
support of worldwide combat and contingency operations.
FY 2018 Program: Funds the procurement of four ReNew/SLEP MH-47G and two New
Build CH-47F helicopters.
US Army Photo
Prime Contractor: The Boeing Company; Philadelphia, PA
CH-47 Chinook
FY 2018
Base Budget OCO Budget Total Request
Qty $M Qty $M Qty
FY 2016* FY 2017**
RDT&E 194.6 - - - 194.6
Procurement 2204 6 - - 220.4 6
Total 415.0 6
ит Numbers may not add due to rounding
AIRCRAFT & RELATED SYSTEMS
1-10
431 / 570
432 / 569
FY 2018 Program Acquisition Costs by Weapon System
UH-60 Black Hawk
The UH-60 Black Hawk is a twin engine,
single-rotor, four bladed utility -
helicopter that is designed to carry
a crew of 4 and a combat equipped
squad of || or an external load up to
9,000 Ibs. The UH-60 comes in many
variants and with many different
modifications. Variants may have different
capabilities and equipment in order to
fulfill different roles. The Army variants can
be fitted with stub wings to carry additional fuel tanks or weapons.
The UH-60M Black Hawk is a digital networked platform with greater range and lift to support
operational Commanders through air assault, general support command and control, and
aeromedical evacuation. An HH-60M is a UH-60M Black Hawk integrated with the Medical
Evacuation (MEDEVAC) Mission Equipment Package (MEP) kit, which provides day/night and
adverse weather emergency evacuation of casualties.
Mission: Provides a highly maneuverable, air transportable, troop carrying helicopter for all
intensities of conflict, without regard to geographical location or environmental conditions. It
moves troops, equipment, and supplies into combat and performs aeromedical evacuation and
multiple functions in support of the Army's air mobility doctrine for employment of ground
forces.
FY 2018 Program: Funds the procurement of 48 UH-60M aircraft in the second year of a
follow-on 5-year multiyear procurement (MYP) contract (FY 2017 — FY 2021). Also funds the
continued development of upgrades to the UH-60L Digital, now designated as the UH-60V.
Prime Contractor: Sikorsky Aircraft; Stratford, CT
UH-60 Black Hawk
FY 2016* FY 2017** ati |
Base Budget OCO Budget Total Request
oO M фу я QQ Ж у M фу $M бу
RDT&E 64.0 - 46.8 - 34.4 - - - 34.4
Procurement 1,701.8 107 1,305.5 53 1,024.6 48 - - 1024.6 48
Total 1,765.8 107 1,352.3 53 1,059.0 48 - - 1,059.0 48
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
AIRCRAFT & RELATED SYSTEMS
432 / 570
433 / 569
FY 2018 Program Acquisition Costs by Weapon System
E-2D Advanced Hawkeye
The E-2D Advanced Hawkeye
is an airborne early warning, all
weather, twin-engine, carrier-based
aircraft designed to extend task force
defense perimeters. The Advanced
Hawkeye provides improved
battlespace target detection and
situational awareness, especially in the
littorals; supports the Theater Air and Missile Defense operations; and improves operational
availability for the radar system. Relative to the E-2C aircraft, the E-2D aircraft provides
increased electrical power, a strengthened fuselage, and upgraded radar system,
communications suite, and mission computer.
Mission: Provides theater air and missile sensing and early warning; battlefield management
command and control; acquisition tracking and targeting of surface warfare contacts;
surveillance of littoral area objectives and targets; and tracking of strike warfare assets.
FY 2018 Program: Funds five E-2D aircraft in the fifth year of a multiyear procurement
contract, associated support, continued development of systems, and advance procurement for
additional aircraft in FY 2019.
Prime Contractors: Airframe: Northrop Grumman Corporation; Bethpage, NY
(Engineering) and St. Augustine, FL (Manufacturing)
Engine: Rolls-Royce Corporation; Indianapolis, IN
Radar: Lockheed Martin Corporation; Syracuse, NY
E-2D Advanced Hawkeye |
FY 2016* FY 2017** EE MEN
Base Budget 00 Budget Тока! Request
W W и (0) промо $M 0
RDT&E 1111 - 363.8 - m5 - -M3 -
Procurement 1,021.6 5 1055 6 095 5 - 5 8,0085. 3
Spares 113 - 204 - 13 - - - M3 -
Total 1,244.0 5 13994 6 1164 5 - + 4 5
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
AIRCRAFT & RELATED SYSTEMS
433 / 570
434 / 569
FY 2018 Program Acquisition Costs by Weapon System
H-I Program: AH-IZ Viper / UH-1Y Venom
The H-I program replaces the АН-ІУУ
Super Cobra and the ОН-ІМ Huey helicopters
with the AH-1Z Viper and UH-1Y Venom, the next
generation of USMC Attack and Utility aircraft.
Speed, range, and payload have been increased
significantly, while supportability demands, training
timelines, and total ownership cost have decreased.
The advanced cockpit is common to both aircraft, reduces ج
operator workload, improves situational awareness, and provides
growth potential for future weapons and joint digital interoperability
enhancements. The cockpit systems assimilate onboard planning, communications, digital fire
control, all weather navigation, day/night targeting, and weapons systems in mirror-imaged crew
stations. The procurement strategy converts 37 AH-IW helicopters into АН-175, builds
152 new AH-IZs, remanufactures 10 Н-ІМ helicopters into UH-IYs, and builds 150 new
UH-IYs. Both aircraft are in full rate production. The UH-IY helicopter completed the
program of record procurement of 160 UH-IY aircraft т FY 2016.
Mission: AH-IZ: Provides close air support, air interdiction, armed reconnaissance, strike
coordination and reconnaissance, forward air control (airborne), and aerial escort during
day/night operations in support of naval expeditionary operations or joint and combined
operations. ОН-1Ү: Provides combat assault transport, close air support, armed
reconnaissance, strike coordination and reconnaissance, forward air control (airborne), air
delivery, airborne command and control, aerial escort and air evacuation during day/night and
reduced weather conditions.
FY 2018 Program: Funds the procurement of 22 new build AH-IZ aircraft. Funds
developmental efforts to support follow-on improvements to sensors and weapons integration,
avionics, and air vehicle components (һас will address deficiencies, systems safety,
obsolescence, reliability, and cost growth issues for both (һе АН-12 and ОН-ІҮ helicopters.
Prime Contractor: Bell Helicopter Textron, Incorporated; Fort Worth, TX
H-I Program (АН-17 Viper / ОН-ІҮ Venom)
FY 2016* FY 2017** == AES —
Base Budget OCO Budget Total Request
ы у ü o әл
RDT&E 26.8 - 21.4 - 613 - - - 61.3 -
Procurement 840.1 29 817.0 4 5 2) - - 1005 1
Total 866.9 29 844.4 24 1818 1) - - BIS 1
* FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-13
434 / 570
435 / 569
FY 2018 Program Acquisition Costs by Weapon System
The Р-ВА Poseidon is an multi-mission
platform designed to replace the P-3C
Orion propeller driven aircraft. This
derivative of the Boeing 737 aircraft is an
all weather twin engine, maritime patrol
aircraft designed to sustain and improve
armed maritime and littoral capabilities
in traditional, joint, and combined roles to counter changing and emerging threats. All
sensors onboard contribute to a single fused tactical situation display which is then shared
over both military standard and internet protocol data links, allowing for seamless delivery of
information between U.S. and allied forces. The P-8A will carry a new radar array which is a
modernized version of the Raytheon APS- 149 Littoral Surveillance Radar System.
Image courtesy
f US Navy
x
`
Mission: Provides Maritime Patrol Anti-Submarine Warfare (ASW), Anti-Surface Warfare
(ASuW), and armed Intelligence, Surveillance and Reconnaissance (ISR) capabilities in
maritime and littoral areas above, on, and below the surface of the ocean.
FY 2018 Program: Procures seven P-8A aircraft, support equipment, spares, and advance
procurement for FY 2019 aircraft. Continues research and development on the P-8A
capabilities to meet the ASW, ASuW, and ISR objectives that will be delivered incrementally
while full rate production continues for the baseline aircraft.
Prime Contractors: Airframe: Boeing; Seattle, WA
Engine: CFM International; Cincinnati, OH
P-8A Poseidon
FY 2016* FY 2017** е
Base Budget OCO Budget Total Request
$M Qty $M Qty м бо Mo Qy $M Q
RDT&E 221.6 - 2393 - 190.7 - - - 190.7 -
Procurement 32243 17 2,934 Il 1,385.6 1 - - 1,385.6 1
$pares 69 - 44.1 - 331 - - - 33.1 -
Total 3,458.8 17 3,267.4 17 — 1,6094 1 - - 1,6094 7.0
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
435 / 570
436 / 569
FY 2018 Program Acquisition Costs by Weapon System
CH-53K Heavy Lift Replacement Helicopter
The CH-53K King Stallion is a
marinized heavy-lift helicopter
that replaces the U. S. Marine
Corps CH-53E, which was
introduced in 1980.
The CH-53K will provide
improved lift and range
capabilities, performance,
commonality, cargo-handling,
reliability, maintainability, interoperability, ship integration, survivability, and force protection.
The CH-53K is designed to support Marine Air-Ground Task Force (MAGTF) heavy-lift
requirements in the 215% century joint environment, and is the only heavy-lift platform that can
lift the MAGTF ashore. It will provide an unparalleled high-altitude lift capability with nearly
three times the external lift capacity of the CH-53E. А total of 194 aircraft are planned for
procurement. The program achieved a Milestone C decision and will begin Low Rate Initial
Production LRIP) in FY 2017.
Mission: Conducts expeditionary heavy-lift assault transport of armored vehicles, equipment
and personnel to support distributed operations deep inland from a sea-based center of
operations.
FY 2018 Program: Funds the procurement of the 4 Low-Rate Initial Production (LRIP)
aircraft. Development efforts continue flight tests of System Demonstration Test Article
(SDTA) aircraft.
Prime Contractor: Sikorsky Aircraft Corporation; Stratford, CT
CH-53K Heavy Lift Replacement Helicopter
FY 2016* FY 2017** абы
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 563.2 - 404.8 - 340.8 - - - 340.8 -
Procurement 413 - 431.0 2 114.7 4 - - 114.7 4
Total 604.5 - 841.8 2 1,055.5 4 - - 1,055.5 4
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-15
436 / 570
437 / 569
FY 2018 Program Acquisition Costs by Weapon System
VH-92A Presidential Helicopter š
The УН-92А replaces the legacy
Presidential Helicopter fleet — the
VH-3D, which was fielded in 1974,
and the VH-60N, which was fielded
in 1989. The VH-92A will be based
on Sikorsky's commercial S-92A
helicopter. The УН-92А% acquisition
strategy involves the integration of
mature government-defined mission
systems and an executive interior
into an existing air vehicle.
The program entered the Engineering
and Manufacturing Development
(EMD) phase in FY 2014. A total of
21 operational aircraft will be
procured. Two Engineering Development Model (EDM) and four System Demonstration Test
Article (SDTA) aircraft have been delivered in EMD.
^^ E
ips it
Mission: Provide safe, reliable and timely transportation for the President, Vice President,
Foreign Heads of State, and other official parties as directed by the Director of the White
House Military Office. Mission tasking includes administrative lift and contingency operations.
FY 2018 Program: Funds the continuing EMD effort, including: beginning Contractor Testing
(CT) for airworthiness certification and commencing modification of EDM and SDTA aircraft to
VH-92 configuration.
Prime Contractor: Sikorsky Aircraft Corporation; Stratford, CT
VH-92A Presidential Helicopter |
FY 2016* FY 2017** 0
Base Budget 0C0 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 490.8 - 3384 - 4519 - - - 4.9 -
Procurement - - = - - - - -
Total 490.8 - 338.4 - 45.9 - - - 51.9
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
AIRCRAFT & RELATED SYSTEMS
1-16
437 / 570
FY 2018 Program Acquisition Costs by Weapon System
F/A-18 E/F Super Hornet
The F/A-18 E/F Super Hornet is a carrier-based
multi-role tactical fighter and attack aircraft.
Two versions are being produced: the
single-seat E model and the two-seat F model.
The Super Hornet is an attack aircraft as
well as a fighter through selected use of
external equipment and advanced networking
capabilities to accomplish specific missions.
This "force multiplier" capability gives the
operational commander more flexibility
in employing tactical aircraft in a rapidly
changing battle scenario. In its fighter mode,
the aircraft serves as escort and fleet air defense. In its attack mode, the aircraft provides force
projection, interdiction, and close and deep air support.
Image courtesy
of US Navy
Mission: Provides multi-role attack and strike fighter capability which includes the traditional
applications, such as fighter escort and fleet air defense, combined with the attack applications,
such as interdiction and close air support.
FY 2018 Program: Procures fourteen E/F model aircraft, which will lessen the shortfall in
Naval combat aircraft.
Prime Contractors: Airframe: Boeing; St. Louis, MO
Engine: General Electric Company; Lynn, MA
F/A-18 E/F Super Hornet
FY 2016* FY 2017** Ше.
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qy Ж» Qty $M — Qty
RDT&E ; : — то
Procurement 350.0 5 2,504.9 26 1,253.1 14 - - 1,253.1 14
Total 350.0 5 2,504.9 26 1,253.1 14 - - 1,253.1 I4
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
AIRCRAFT & RELATED SYSTEMS
438 / 569 438 / 570
439 / 569
FY 2018 Program Acquisition Costs by Weapon System
Presidential Aircraft Recapitalization (PAR)
The Presidential Aircraft Recapitalization
(PAR) program will replace the current
VC-25A (Boeing 747-200) "Air Force One" ; = КЕЕ
aircraft with a new, modified 747-8 2% = agn
to provide the President, staff, and guests |
with safe and reliable air transportation
at the same level of security and
communications capability available in the
White House. Due to advancing age, the
VC-25A is experiencing increasing out of
service times — currently well over a year
for heavy maintenance to maintain compliance with Federal Aeronautics Administration
airworthiness standards. Boeing will be the sole source integrator responsible for modifying,
testing, and fielding two PAR aircraft by 2024.
Mission: Provides safe, secure, worldwide transport to ensure the President can execute the
constitutional roles of Commander-in-Chief, Head of State, and Chief Executive.
FY 2018 Program: Continues preliminary design and incremental funding of two
commercial aircraft for future modification to the PAR configuration. Begins Engineering and
Manufacturing Development of the PAR modifications to the commercial aircraft and required
test activities.
Prime Contractor: The Boeing Company; Seattle, WA
Presidential Aircraft Recapitalization (PAR)
FY 2016* FY 2017** Bi.
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 82.4 - 3512 2 4341 - - - 4341 -
Procurement - - - - - - - - -
Total 824 - 3512 2 4341 - - - 4341 - |
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-18
439 / 570
440 / 569
FY 2018 Program Acquisition Costs by Weapon System
Long Range Strike
Long Range Strike (LRS) is intended to B-2 Spirit
counter post-2020 challenges to DoD's power
projection capabilities. The LRS initiatives, collectively
termed "Family of Systems" (FoS), will provide a synergistic, more
cost-effective force multiplier power projection capability in the
post-2020 threat environment. The LRS program includes the next
Generation and legacy bombers. Current bombers in the Air Force
inventory are the В-1, B-2, and B-52 aircraft. The B-21 (Long
Range Strike Bomber) is a new, high-tech long range
bomber that will eventually replace the Air Force's
aging bomber fleet. The B-21 will be a key
component of the joint portfolio of conventional
and nuclear deep-strike capabilities.
B1 Lancer
Heavy Bomber
B-52
w * Stratofortress
Mission: Flies into enemy territory to destroy
strategic targets such as major military installations, factories a
cities to debilitate an adversary's capacity to wage war. The B-| bomber-can perform a variety
of missions, including that of conventional carrier for theater operations and can rapidly deliver
massive quantities of precision and non-precision weapons against any adversary, worldwide, at
any time. The B-2 aircraft delivers both conventional and nuclear munitions, capable of massive
firepower in short time anywhere. The B-52 aircraft maintains nuclear or conventional
missions. Mission details of the B-21 are currently classified.
FY 2018 Program: Continues engineering and manufacturing development of the next
generation B-2| and upgrades to modernize legacy strategic bombers.
Prime Contractors: Northrop Grumman Aerospace Systems; Palmdale, CA
Long Range Strike
FY 2016* FY 2017** 0:
Base Budget 0C0 Budget Total Request
5М Qty $M Qty $M Qty 5М 0у $M Qty
RDT&E 1,149.8 - 1,920.5 - 2,565.6 - - - 2,565.6 -
Procurement 281.8 - 306.1 - 361.7 - - - 361.7 -
Spares 24.0 - 15.1 - 18.1 - - - 18.1 -
Total 1,455.6 - 22417 - | 2,9454 - - - 2,9454 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-19
440 / 570
441 / 569
FY 2018 Program Acquisition Costs by Weapon System
F-22 Raptor
The F-22 Raptor is a fifth generation air NS
superiority aircraft fighter. The Raptor is designed to ©.
penetrate enemy airspace and achieve first-look,
first-kill capability against multiple targets. It са
has unprecedented survivability and до CM
lethality, ensuring the Joint Forces |
have freedom from attack, freedom to maneuver,
and freedom to attack.
USAF Photo
Mission: Provides the U.S. Enhanced air superiority/global
strike capability to counter and defeat air-air and air-ground
threats in a highly contested environment by conducting counter air, Destruction of Enemy Air
Defenses (DEAD) and cruise missile defense missions.
FY 2018 Program: Continues critical planned modernization for F-22 aircraft ма
incremental capability upgrades and key reliability and maintainability improvements. Continues
development and testing of advanced air superiority capabilities to include integration of AIM-
1200 and AIM-9X, additional electronic protection, and improved geolocation. Completes
fielding of Increment 3.1, enhancing Global Strike capabilities such as Small Diameter Bomb |,
Synthetic Aperture Radar and Geolocation.
Prime Contractors: Lockheed Martin; Marietta, GA and Fort Worth, TX
Pratt & Whitney; Hartford, CT
F-22 Raptor
FY 2016* FY 2017** ae
Base Budget OCO Budget Total Request
jM Qty M 0) M Qty jM 0) $M Q
RDT&E 340.2 - 419 - 5 - - - 045 .
Procurement | 1154 - MM - 204 - - - 194 -
Spares 29 - 5.2 - 8.5 - - - 8.5 -
Total 518.5 - 1044 - 955 - - - 955 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-20
441 / 570
442 / 569
FY 2018 Program Acquisition Costs by Weapon System
KC-46A Tanker
The KC-46, an aerial refueling tanker,
will provide aerial refueling support to the Air
Force, Navy, and Marine Corps aircraft. The aircraft
Provides increased refueling capacity, improved efficiency,
and increased cargo and aeromedical evacuation capability
over the current KC-135 Stratotanker, which is more than 50 years old. —у
The first phase of aerial refueling tanker recapitalization will procure 179 aircraft, approximately
one-third of the current KC-135 tanker fleet. Envisioned KC-Y and KC-Z programs will
ultimately recapitalize the entire tanker fleet over a period of more than 30 years. The KC-46
aircraft is assembled on the existing commercial 767 production line and militarized in the
Everett Modification Center, both of which are located in Everett, Washington.
ж.
USAF Photo
Mission: Provides the capability to refuel joint and coalition receivers via a boom or drogue
system and will augment the airlift fleet with cargo, passenger and aeromedical evacuation
capabilities. Aerial refueling forces perform these missions at the strategic, operational, and
tactical level across the entire spectrum of military operations. The KC-46 aircraft will
operate in day/night and adverse weather to enable deployment, employment, sustainment, and
redeployment of U.S. and Coalition forces.
FY 2018 Program: Continues the Air Force's development efforts of a militarized variant of
the Boeing 767-2C aircraft, the building and integration of military capabilities into four
development aircraft, the completion of developmental testing and the start of Initial
Operational Test and Evaluation. Also includes funding for the continued development of
technical manuals, continued Type І training, and collection of simulator and maintenance data.
Continues a fourth year of Low Rate Initial Production (LRIP), procuring 15 aircraft in FY 2018.
Prime Contractor: The Boeing Company; Seattle, WA
KC-46A Tanker
FY 2016* FY 2017** if.
Base Budget OCO Budget Total Request
М Q0 и Q0 МҮ Qy M 0 $M 60у
RDT&E 512.1 - 261.7 - 93.8 - - - 93.8
Procurement — 23346 D 28846 I5 | MM p - - 1561 В
pares 34 - 12 - 4134 - - - 413 -
Total 2,959.7 lJ 3,318.5 I5 3,0529 р - - 3019 В
ЖҮ 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-21
442 / 570
FY 2018 Program Acquisition Costs by Weapon System
The F-15C/D is a twin engine, single seat,
supersonic, all-weather, day/night, air
superiority fighter. Тһе F-I5E is a twin
engine, two seat, supersonic dual-role,
day/night, all-weather, deep interdiction
fighter with multi-role air-to-air capabilities.
USAF Photo
Mission: Provides the Air Force with the capability to gain and maintain air supremacy over
the battlefield.
FY 2018 Program: Continues the F-I5E Radar Modernization Program (RMP), which
replaces the legacy radar using existing technology from other aviation platforms and solves
parts obsolescence problems to provide improved reliability and performance (increased
synthetic aperture radar range and resolution), including air-to-air and air-to-ground modes.
Continues the F-15 C/D radar upgrade program, which replaces the mechanically-scanned
antenna оп F-I5C/D aircraft with an active electronically scanned array (AESA). Continues
development of the Eagle Passive/Active Warning Survivability System, which is intended to
improve F-I5E survivability by enhancing the ability to detect, deny, or defeat air and ground
threats.
Prime Contractor: Boeing; St Louis, MO
F-15 Eagle
FY 2016* FY 2017** асаа
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 384.5 - 613.4 - 530.1 - - - 530.1 -
Procurement 596.9 - 105.7 - 4112 - - - 417.2 -
Spares 21.1 - 495 - 15.8 - - - 15.8 -
Total 1,002.5 - 768.5 - 963.1 - - - 963.1 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
AIRCRAFT & RELATED SYSTEMS
1-22
443 / 569 443 / 570
444 / 569
FY 2018 Program Acquisition Costs by Weapon System
Combat Rescue Helicopter (CRH)
The Combat Rescue Helicopter (CRH) Program,
formerly referred to as HH-60 Recapitalization,
will replace the aging HH-60G helicopter. The HH-60
Pave Hawk is the U.S.Air Force version
of the U.S. Army's
UH-60 Black Hawk,
modified for Combat Search
and Rescue (CSAR) in all weather
situations. The CRH program
will leverage in-service production
air vehicles and training systems and then integrate existing technologies and missions systems
to acquire a new system. Onboard defensive capabilities will permit the СЕН system to
operate in an increased threat environment. An in-flight refueling capability will provide an
airborne ready alert capability and extend its combat mission range. The CRH program plans
to procure a total of 112 aircraft.
USAF Photo
Mission: Conduct day and night marginal weather CSAR in order to recover downed aircrew
and isolated personnel in hostile environments. The CRH will perform a wide array of
collateral missions, including casualty evacuation (CASEVAC), medical evacuation (MEDEVAC),
non-combat evacuation operations, civil search and rescue, international aid, disaster
humanitarian relief, and insertion/extraction of combat forces.
FY 2018 Program: Funds Engineering and Manufacturing Development (EMD) activities,
including development and testing efforts on the System Demonstration Test Article (SDTA)
aircraft, missions systems, training systems and associated product support.
Prime Contractor: Sikorsky Aircraft Corporation; Stratford, CT
Combat Rescue Helicopter
FY 2016* FY 2017** RICO
Base Budget OCO Budget Total Request
5М Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 150.3 - 3193 - 354.5 - - - 354.5 -
Procurement - - - - = = - - - -
Total 150.3 - 3193 - 343 - - - 354.5 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
AIRCRAFT & RELATED SYSTEMS
1-23
444 / 570
445 / 569
5 A
m
e = li :
А
КА < > С
STATES OY
This page intentionally left blank.
445 / 570
446 / 569
FY 2018 Program Acquisition Costs by Weapon System
Command, Control, Communications, Computers, апа
Intelligence (С4Г) Systems
The Department is well underway in transforming and developing new concepts for
the conduct of future joint military operations to achieve full spectrum dominance.
This overarching goal to defeat any adversary or control any situation across the full
range of military operations is achieved through a broad array of capabilities enabled by
an interconnected network of sensors, shooters, command, control, and intelligence.
Net-centricity transformed the way that information is managed to accelerate decision
making, improve joint warfighting, and create intelligence advantages. U.S. forces are
heavily-networked and require reliable secure trusted access to information and
depend upon network-based interconnectivity for increased operational effectiveness.
By enhancing information sharing, dispersed forces are able to communicate, maneuver,
share a common user - defined operating picture, and successfully complete assigned
missions more efficiently.
The FY 2018 budget request supports the net-centricity service-based architecture
pattern for information sharing. lt is being implemented by the C4l community via
building joint architectures and roadmaps for integrating joint airborne networking
capabilities with the evolving ground, maritime, and space networks. Іс encompasses
the development of technologies like gateways, waveforms, network management, and
information assurance.
FY 2018 Command, Control, Communications, Computers, and
($ in Billions)
Automation
$0.7
Base
Communica-
tions
$1.0
Information
Security &
Assurance
$1.0
Theater Combat
C3 & Services
$5.2
Technology
Develop-ment
$0.7
Numbers may not add due to rounding С4І SYSTEMS
2-1
446 / 570
447 / 569
FY 2018 Program Acquisition Costs by Weapon System
Warfighter Information Network - Tactical
The Warfighter Information Network-Tactical
(WIN-T) is the cornerstone for Army's high speed,
high capability backbone communications network, y ^
linking Warfighters in the battlefield with the Global САЛЛИМ т)
Information Grid. The network is intended to provide E e
command, control, communications, computers,
intelligence, surveillance, and reconnaissance. The
system is developed as a network for reliable, secure,
and seamless video, data, imagery, and voice services
for the Warfighters in theater to enable decisive
combat actions. Increment | provides
“networking at the halt” by upgrading the Joint Network Node (JNN) satellite capability to access the
Wideband Global Satellite. Increment 2 (Inc 2) provides networking on-the-move to the company
level. Tactical Cyber and Network Operations (TCNO) develops the Network Operations (NetOps)
software to meet the Army's network convergence goals. The TCNO provides the fully integrated
NetOps capability to allow seamless integration of tactical network planning, management, monitoring,
and defense for the Signal Staff.
Mission: Provides the Army with a transformational modernized network. Using satellite and
ground layers, it delivers fully mobile, flexible, dynamic networking capability enabling Joint land forces
to engage enemy forces deeper and more effectively. The WIN-T Inc 2 introduces a mobile, ad-hoc,
self-configuring, self-healing network using satellite on-the-move capabilities, robust network
management, and high-bandwidth radio systems to keep mobile forces connected, communicating, and
synchronized.
FY 2018 Program: Funds the procurement of 61 WIN-T Inc 2 communication nodes and 846 other
configuration items for fielding to 3 Brigade Combat Teams, | Division, and 3 Infantry Brigade Combat
Teams.
Prime Contractors: General Dynamics Corporation; Taunton, MA
Lockheed Martin Corporation; Gaithersburg, MD
Warfighter Information Network- Tactical
FY 2016* FY 2017** ДАЕ
Base Budget 0(0 Budget Total Request
ии Я Qy н у M Q н фу
RDT&E 435 - 49 - 4Л - - - 4.1 -
Procurement 695.1 - 4312 - 420.5 - - - 420.5 -
Spares 395 - 19.8 - 23.9 - - - 13.9 -
Total 118.1 - 461.9 - 449.1 - - : 449.1 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
C4l Systems
447 / 570
448 / 569
FY 2018 Program Acquisition Costs by Weapon System
jo.
Handheld, Manpack, and Small Form Fit Radió Kees,
The Handheld, Manpack, and Small Form Fit (HMS)
program procures radios that are software
reprogrammable, networkable, multi-mode systems
capable of simultaneous voice and data communications.
The HMS encompasses the Handheld Radios
(one-channel Rifleman Radio (RR) and two-channel
Leader Radio (LR), Manpack Radio (MP), and Small Form 4
Fit (SFF) radios. Тһе RR is a handheld radio that connects |
Soldiers at the lowest echelon of the Army network by
providing one-channel secure voice and data communications using Soldier Radio Waveform (SRW).
The LR is a Multiband two-channel handheld radio to be used at the Team, Squad, and Platoon level.
The LR will simultaneously support Single Channel Ground and Airborne Radio System (SINCGARS)
voice interoperability and Soldier Radio Waveform (SRW) data and voice communications in one radio
with both handheld and mounted configurations. The MP radio is a certified Type | radio used for
transmission of up to Secret information. The MP is capable of providing two simultaneous channels
of secure voice and data communications using SINCGARS, SRW, and Demand Assigned Multiple
Access Satellite Communication. The embedded SFF radios may be used for Unmanned Vehicles and
other platform applications.
Mission: Provides voice and data communications to the tactical edge/most disadvantaged Warfighter
with an on-the-move, at-the-halt, and stationary Line of Sight/Beyond Line of Sight capability for both
dismounted personnel and mounted platforms. The MP and the RR extend the network down to the
Squad/Team leader. These networking tactical radio systems meet requirements for the Army, Navy,
Marine Corps, and Special Operations Command and are interoperable with specified radios in the
current forces.
FY 2018 Program: Funds the required full and open competition contract strategy for the RR and
the MP radios. Conducts testing for the MP and the RR candidate products to demonstrate
compliance with program requirements to assess effectiveness, suitability, and survivability and to
obtain material release for Full Rate Production. Funds support safety, spectrum supportability, and
additional certifications necessary to prepare the products for fielding. Procures 506 RR and 3,152 MP,
support equipment, fielding, non-recurring engineering, and platform vehicle integration.
Prime Contractors: General Dynamics C4 Systems Incorporated; Scottsdale, AZ
Harris Radio Corporation; Rochester, NY
Thales Communications Incorporated; Clarksburg, MD
Handheld, Manpack, and Small Form Fit
FY 2016* FY2017* | ieu. —
Base Budget OCO Budget Total Request
и ж му M wy Я у M Q
RDT&E 45 - 18.8 - 20.1 - - - 20.1 -
Procurement 54.6 - 213.6 5,656 3554 - - - 4 -
Total 591 - 292.4 5,656 315.5 - - - 355 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
C4l SYSTEMS
448 / 570
449 / 569
5 A
m
e = li :
А
КА < > С
STATES OY
This page intentionally left blank.
449 / 570
FY 2018 Program Acquisition Costs by Weapon System
Ground Systems
The Department is modernizing its ground force capabilities to ensure the United
States remains a dominant force capable of operating in all environments across the full
spectrum of conflict. The Army and Marine Corps equip each soldier and Marine with
the best equipment available to succeed in both today's and tomorrow's operations.
Ongoing technology research and concept exploration will benefit future Army and
Marine Corps combat portfolios.
The Army continues to modernize and upgrade select Major Defense Acquisition
Programs in FY 2018, including Stryker vehicles, Abrams Tanks, Bradley Fighting Vehicles,
and Paladin 155mm Howitzers. The Marine's ground force focus in FY 2018 is on the
Amphibious Combat Vehicle (ACV). The ACV will deliver shore and sea-based infantry
to the battlefield in vehicles designed for future operational environments. All the
Services will procure the Joint Light Tactical Vehicle (JLTV) as part of the Low Rate
Initial Production (LRIP).
FY 2018 Ground Systems - Total: $11.2 Billion
($ in Billions)
Weapons
$1.2
Combat Vehicles
$3.4
Heavy Tactical
Vehicles
$0.4
Support Light Tactical
Equipment Vehicles
$4.8 $1.3
Medium Tactical
Vehicles $0.1
GROUND SYSTEMS
Numbers may not add due to rounding
3-1
450 / 569 450 / 570
451 / 569
FY 2018 Program Acquisition Costs by Weapon System
Joint Light Tactical Vehicle
The Joint Light Tactical Vehicle (JLTV) is a joint
program currently in development for the Army
and Marine Corps. The JLTV is intended to
replace the High Mobility Multipurpose
Wheeled Vehicle (НММУУУ), which is the
current light tactical vehicle. The JLTV concept
is based on a family of vehicles focused on
scalable armor protection and vehicle agility,
and mobility required of the light tactical vehicle t E
fleet. The JLTV will provide defensive measures to protect ens while in transport, increase
payload capability, and achieve commonality of parts and components to reduce the overall life
cycle cost of the vehicle. The JLTV project seeks to optimize performance, payload, and
protection of the crew and vehicle while ensuring a design that is transportable by CH-47,
CH-53, and C-130 aircraft. The program achieved Milestone C in October 2015.
Mission: Provides a light tactical vehicle capable of performing multiple mission roles, and
providing protected, sustained, networked mobility for personnel and payloads across the full
range of military operations. There are two variants planned: Combat Support Vehicles
(3,500 16) and Combat Tactical Vehicles (5,100 Ib).
FY 2018 Program: Funds the third and final year of Low Rate Initial Production (LRIP),
procuring 2,777 trucks. Continues Full Up System Level (FUSL) test, Multi-Service
Operational Test and Evaluation (MOT&E), Automatic Fire Extinguishing System (AFES) test,
and Command, Control, Communications, Computers, Intelligence, Surveillance, and
Reconnaissance (С415К) test.
Prime Contractor: Oshkosh Corporation; Oshkosh, WI
Joint Light Tactical Vehicle
FY 2016* FY 2017** M
Base Budget 0(0 Budget Total Request
SM 0 $M Qty $M Qy M 0 $M Qty
RDT&E USA 312 - 115 - 235 - - - 135 -
RDT&E USMC 248 - 332 - 207 - - - 20.7 -
Procurement USA 249.9 686 581.5 1,828 8044 2,110 - - 8044 2,110
Procurement АР 1.7 - 404 - 594 138 l.l 2 60.5 140
Procurement USMC 58.6 119 113.2 192 233.6 527 - - 233.6 527
Total 366.2 805 7758 2,020 1,1416 2,775 I. 2 114271 — 2,777
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
GROUND SYSTEMS
3-2
451 / 570
FY 2018 Program Acquisition Costs by Weapon System
Armored Multi-Purpose Vehicle (AMPV)
The Armored Multi-Purpose Vehicle (AMPV)
will replace the MI 13 Armored Personnel
Carrier program that was terminated in
2007. The AMPV will have five mission
roles: General Purpose, Medical
Treatment, Medical Evacuation, Mortar
Carrier and Mission Command. The
current MI 13 Armored Personnel L
Carrier Mission Equipment Packages (MEPs) |
will be integrated onto a new hull
structure based on the Bradley Fighting _ <
Vehicle design to give the Army its required capability at an affordable cost.
Mission: Enables the Armored Brigade Combat Team (ABCT) commander to control a
relentless tempo that overwhelms the threat with synchronized and integrated assaults that
transition rapidly to the next engagement.
FY 2018 Program: Funds Engineering and Manufacturing Development (EMD) prototype
testing (including performance and reliability testing), completion of the Interim Design Review
(IDR) and the Functional Configuration Audit (FCA), continued development of Logistics
Support products, procurement of Live Fire Test Assets, and procurement of 107 Low Rate
Initial Production vehicles.
Prime Contractor: BAE Systems; York, PA
Armored Multi-Purpose Vehicle (ЛЛА)
FY 2016* FY 2017** Аи
Base Budget OCO Budget Total Request
SM 0 $M Qty $M Qty $M Qty $M Qty
RDT&E 213.0 - 184.2 - 1998 - - - 1993
Procurement - - - - 193.7 4) 2539 6 MI.6 107
Total 213.0 - 184.7 - 39315 0 253.9 6 6414 107
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
ix **FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
GROUND SYSTEMS
3-3
452 / 569 452 / 570
453 / 569
FY 2018 Program Acquisition Costs by Weapon System
Family of Heavy Tactical Vehicles
The Family of Heavy Tactical Vehicles (FHTV)
consists of the Palletized Load System
(PLS) and the Heavy Expanded Mobility
Tactical Truck (HEMTT).
The PLS entered service in 1993
and consists of a 16.5 ton, 10 wheel
tactical truck with self load/unload capability.
The PLS carry payload on flat rack cargo bed, trailer, or International Standards
Organization (ISO) containers. Тһе НЕМТТ is a 10 ton, 8 wheel (8x8) truck that comes іп
several configurations: Tanker to refuel tactical vehicles and helicopters, Tractor to tow the
Patriot missile system and Multi-Launch Rocket System (MLRS), Wrecker to recover
vehicles, and Cargo truck with a materiel handling crane. The HEMTT family entered
service in 1982.
Mission: Provides transportation of heavy cargo to supply and re-supply combat vehicles
and weapons systems. The PLS is fielded to transportation units, ammunition units, and to
forward support battalions with the capability to self-load and transport a 20 ft. ISO
container. The upgraded HEMTT A4 is an important truck to transport logistics behind
quick-moving forces such as the M-I Abrams and Stryker. The HEMTT family carries all
types of cargo, especially ammunition and fuel, and is used for line haul, local haul, unit
resupply, and other missions throughout the tactical environment to support modern and
highly mobile combat units.
FY 2018 Program: Funds the procurement of 621 FHTVs, as well as trailers to
modernize the heavy tactical vehicle fleet for the Active, National Guard, and Reserve units
and to fill urgent theater requirements.
Prime Contractor: Oshkosh Corporation; Oshkosh, WI
Family of Heavy Tactical Vehicles
FY 2016* FY 2017** Боа
Base Budget 00 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E - - 1.4 - 105 - 10.5 -
Procurement 30.8 35 45.] 481 81.6 359 25,9 262 107.5 621
Total 30.8 345 57.1 481 92.1 359 25.9 262 118.0 621
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
GROUND SYSTEMS
453 / 570
454 / 569
FY 2018 Program Acquisition Costs by Weapon System
М-І Abrams Tank Modification/Upgrades
The MIA2 Abrams is the Army's main 4
battle tank, which first Ep Army noto
entered service in 1980.
It was produced from 1978
until 1994. Since then, the
Army has modernized it with a
series of upgrades to improve its
capabilities, collectively known as
the System Enhancement Package (SEP) and the Tank Urban Survival Kit (TUSK). Current
modifications to the MI Abrams include Ammunition Data Link, Low Profile Commander’s
Remote Operated Weapon Station and Power Train Improvement & Integration Optimization,
which provide more reliability, durability and fuel efficiency. Survivability enhancements include
Active Protection System upgrades.
Mission: Provides mobile and protected firepower for battlefield superiority against heavy
armor forces.
FY 2018 Program: Funds ECP |А testing and continues Engineering Change Proposal (ECP)
IB (lethality improvements) development. Funds the upgrade of 56 MIAI vehicles variants to
the MIA2 SEP v3 variant. Continues support of the ECP IA installation of
MIA2SEP v3 production т FY 2018 and as well as numerous approved modifications to fielded
MIA2 Abrams tanks, including the Ammunition Data Link (ADL) to enable firing of the Army's
new smart 120mm ammunition, Low Profile Commander's Remote Operating Weapon Station
(CROWS) and Active Protection System.
Prime Contractor: General Dynamics Corporation; Sterling Heights, MI
М-І Abrams Tank Modification/Upgrades
FY 2016* FY 2017** еее тал алт аа
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M 0
RDT&E 138 - 88.5 - 108.6 - - 108.6
Procurement 430.9 - 810.2 21 5238 20 581.5 36 1,105.3 56
Total 504.7 - 898.1 27 6324 20 581.5 36 1,213.9 56
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
GROUND SYSTEMS
3-5
454 / 570
455 / 569
FY 2018 Program Acquisition Costs by Weapon System
Paladin Integrated Management (PIM)
The M109 Family of Vehicles (FOV)
consists of the MI09A6 Paladin 155mm #
Howitzer, the most advanced
self-propelled cannon system in the
Army, and the Field M992A2 Artillery
Ammunition Support Vehicle (FAASV),
an armored resupply vehicle. The
Paladin Integrated Management (PIM)
program addresses obsolescence, space, ™
weight, and power concerns and
Ensures sustainment of the М109 FOV
through 2050. Тһе PIM replaces the current MIO9A6 Paladin and M992A2 FAASV vehicles
with a more robust platform, incorporating the M2 Bradley common drive train and suspension
components. The PIM fills the capability gap created by cancellation of the Non-Line of Sight
Cannon (NLOS-C) (a component of the Future Combat System program) in 2009. Begins Full
Rate Production (FRP) in FY 2018.
Mission: Provides the primary indirect fire support for Armored Brigade Combat Teams,
armored and mechanized infantry divisions as well as an armored resupply vehicle.
FY 2018 Program: Funds the close out of the Engineering Manufacturing Development
(EMD) work, training devices for cannon system development, and procures 71 PIM systems.
Prime Contractor: BAE Systems; York, PA
Paladin Integrated Management (PIM)
FY 2016* тда ұ
Base Budget 0(0 Budget Total Request
M Qty M Qty M Q M 05 $M Qty
RDT&E 136.4 - 415 - 6.1 - - - 6. | -
Procurement 113, 30 5945 48 646.4 59 125.7 D ml! 1!
Total 410.3 30 636.0 48 6525 59 1251] n ne ТІ
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
GROUND SYSTEMS
3-6
455 / 570
FY 2018 Program Acquisition Costs by Weapon System
Family of Medium Tactical Vehicles
The Family of Medium Tactical Vehicles (FMTV) is a
family of diesel powered trucks in the 2'/-ton
and 5-ton payload class. The vehicle first went into
service in 1996. Іс capitalizes оп the current state
of automotive technology including a diesel
engine, automatic transmission, and central tire
inflation system (CTIS). The family of vehicles
significantly reduces logistics burden and
operating costs, taking advantage of over
80 percent parts commonality. Numerous models
perform a wide variety of missions including cargo
transport (cargo model), vehicle recovery operations (wrecker),
construction (dump), line haul (tractor), airdrop missions, and civil disaster relief. The
FMTV also serves as the platform for the High Mobility Artillery Rocket System (HIMARS)
and support vehicle for the Patriot missile. It is strategically deployable in C-5, C-17, and
C-130 aircraft. Incorporating Engineering Change Proposal in FY 2018 to increase suspension
capacity, improved ride quality and mobility when inserting underbody protection.
Mission: Provides unit mobility and resupply of equipment and personnel for rapidly
deployable worldwide operations on primary and secondary roads, trails, cross-country terrain,
and in all climatic conditions.
FY 2018 Program: Funds the procurement of 37 Medium Tactical Vehicles to support the
Army modular transformation effort to modernize the tactical wheeled vehicle fleet for
medium size trucks.
Prime Contractor: Oshkosh Corporation; Oshkosh, WI
Family of Medium Tactical Vehicles (ҒМТУ)
FY 2016* FY 2017** F
Base Budget 0(0 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E - - 6.0 - - - 6.0 -
Procurement 334.0 1,155 352.8 1,252 18.7 37 - - 18.1 31
Total 340 1,155 352.8 1252 84.1 37 - - 84.1 М
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
GROUND SYSTEMS
3-7
456 / 569 456 / 570
457 / 569
FY 2018 Program Acquisition Costs by Weapon System
Stryker Family of Armored Vehicles
Stryker is а 19-соп wheeled armored vehicle that provides
the Army with a family of 17 different vehicles
(10 flat bottom and 7 Double V-Hull). The Stryker
can be deployed by C-130 (flat bottom only),
С-17, and C-5 aircraft and be combat-capable
upon arrival in any contingency area. There are
two basic versions, which include the Infantry
Carrier Vehicle (ICV) and the Mobile Gun System
(MGS) with eight different configurations, which
include the Reconnaissance Vehicle (RV); Anti-Tank Guided Missile (ATGM); Nuclear, Biological,
Chemical, and Radiological Vehicle (NBCRV); Medical Evacuation Vehicle (MEV); Commander's
Vehicle (CV); Fire Support Vehicle (FSV); Mortar Carrier (MC); and Engineer Squad Vehicle (ESV).
Mission: The Stryker vehicle is designed to enable the Brigade Combat Team to maneuver
more easily in close and urban terrain while providing protection in open terrain. It fills the
Army's current transformation goal to equip a strategically deployable brigade using a C-17 or
C-5 and an operationally deployable brigade using a C-130 that is capable of rapid movement
anywhere on the globe in a combat ready configuration. The Stryker enables the Army to
respond immediately to urgent operational requirements.
FY 2018 Program: Funds ECP | testing, ECP 2 Lethality Upgrade and continues support of
the application of multiple fleet-wide modifications. Modifications address the following areas:
Training Devices: Command, Control, Communications, Computers, Intelligence (C4l)
obsolescence; reliability, capability and performance degradation; safety; and operational-related
issues. Provides for the fielding of a 30mm weapon system.
Prime Contractor: General Dynamics Corporation; Sterling Heights, MI
FY 2016* FY 2017% Ше
Base Budget OCO Budget Total Request
Mi 0) jM 0) м Qty M 0) М Qty
RDT&E 215.1 - 1365 - 80.6 - - - 80.6 -
Procurement 975.9 136 | 5999 - 91.6 - - - 91. -
Total 1,191.0 136 | 1354 - | 1782 - - - ll) -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
GROUND SYSTEMS
3-8
457 / 570
458 / 569
FY 2018 Program Acquisition Costs by Weapon System
Amphibious Combat Vehicle (ACV) РА
The Amphibious Combat Vehicle (АСУ) is a Major Defense
Acquisition Program. The ACV will replace the aging Amphibious
Assault Vehicle. The Marine Corps has refined its ACV strategy
based on several factors, including knowledge gained through
multi-year analysis and ongoing development of its Ground
Combat Tactical Vehicle Strategy. The ACV program achieved
Milestone B in November 2015.
Mission: The ACV will provide an armored personnel carrier
balanced in performance, protection, and payload for employment
with the Ground Combat Element across the range of military
operations, including a swim capability. The program has been structured to
provide a phased, incremental capability.
FY 2018 Program: Funds the purchase of 4 Full-Up System Level (FUSL) Test vehicles and
continued Test and Evaluation efforts. Procures the Low Rate Initial Production (LRIP)
of 26 vehicles, plus procurement of related items such as production support, systems
engineering/program management, Engineering Change Orders (ECOs), Government Furnished
Equipment (GFE), and integrated logistics support, and Initial Spares, which support the ACV
Increment |.| program. Milestone C is scheduled in FY 2018.
Prime Contractors: BAE Systems; York, PA
Science Applications International Corporation (SAIC); McClean, VA
Amphibious Combat Vehicle (ACV)
FY 2016* FY 2017** iu
Base Budget OCO Budget Total Request
$M Qty $M Оу $M Qty $M Qty $M Qty
RDT&E 197.0 - 158.7 - 1190 - - - 119.0 -
Procurement - - - - 161.5 26 - - 103 26
Total 197.0 - 158.7 - 340.5 26 - - 340.5 26
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
GROUND SYSTEMS
3-9
458 / 570
459 / 569
5 A
m
e = li :
А
КА < > С
STATES OY
This page intentionally left blank.
459 / 570
460 / 569
FY 2018 Program Acquisition Costs by Weapon System
Missile Defense Programs
Missile Defense is a general term for air and missile defense. This category includes
cruise missile, air and ballistic missile defense systems program development. The
Missile Defense Agency, Army, and the Navy are the program developers. Missile
Defense includes all components designed to defeat hostile ballistic missiles of various
ranges. A missile defense system includes interceptor missiles, as well as the associated
sensors and command, control, battle management, and communications. Other
significant investments include construction; targets and countermeasures; and the
research, development, testing, and evaluation activities. Encompassed in this category
are all programs that are either critical to the functionality of missile defense or
support missile defense as a primary mission. The Aegis Ballistic Missile Defense
System (BMDS) is the naval element of the Ballistic Missile Defense (BMD) and
provides an enduring, operationally effective and supportable BMD capability on Aegis
cruisers, destroyers, and Ashore.
The FY 2018 budget request continues to invest and build inventories of air and missile
defense capabilities, such as the Patriot Advanced Capability-3 (PAC-3) missiles, PAC-3
Missile Segment Enhancements (MSE) interceptors, Standard Missile-3 (5М-3)
interceptors, Terminal High Altitude Area Defense (THAAD) interceptors, and the
Army Navy/Transportable Radar Surveillance-2 (AN/TPY-2) radar. Further, the
Department continues to seek expanded international efforts for missile defense with
allies апа partners to provide pragmatic and cost-effective missile defense
capabilities.
FY 2018 Missile Defense Programs - Total: $9.2 Billion
($ in Billions)
Tactical
Missile
go Ballistic
Missile
Defense
System
$6.5
Tactical
Ballistic
Missile
Defense
$1.4
Note: $9.2 billion does not include the Missile Defense Agency's (MDA) Science and Technology ($292 million),
Military Construction ($3 million), or the Operation and Maintenance ($504 million) funding. The total MDA funding
is $7.9 billion for the FY 2018 request.
Numbers may not add due to rounding MISSILE DEFENSE PROGRAMS
4-1
460 / 570
461 / 569
FY 2018 Program Acquisition Costs by Weapon System
Aegis Ballistic Missile Defense eese
The Aegis Ballistic Missile Defense (BMD) is the naval
element of the Ballistic Missile Defense System (BMDS) and
provides an enduring, operationally effective and supportable
BMD capability on Aegis cruisers, destroyers, and Ashore.
The Aegis BMD builds upon the existing Navy Aegis Weapons
System (AWS) and Standard Missile-3 (SM-3) design.
Upgrades are being made to the weapon system and SM to
expand capability through a series of incremental,
evolutionary improvements to counter more sophisticated
and longer range threats.
Mission: Provides a forward-deployable, mobile and Ashore
capability to detect and track ballistic missiles of all ranges in
all phases of flight with the ability to destroy short- through intermediate-range ballistic missiles
in the midcourse and terminal phases. The Aegis BMD delivers an enduring, operationally
effective and supportable capability on Aegis cruisers, destroyers, and Ashore to defend the U.S.,
deployed forces, and our allies.
FY 2018 Program: Supports procurement of 34 SM-3 Block IB missiles. Procures six SM-3
Block ПА missiles. Integrates SM-3 Block ПА into the BMD Weapon Systems. Continues
development of the Aegis BMD 5.| Weapon Systems and Aegis BMD 6.
Prime Contractors: Aegis Weapon System: Lockheed Martin Corporation; Moorestown, NJ
SM-3 Interceptor: Raytheon Company; Tucson, AZ and Huntsville, AL
AEGIS Ballistic Missile Defense
FY 2018
Base Budget 0(0 Budget Total Request
Mi Qty $M Qty $M y M Qy и Qty
FY 2016* FY 2017**
RDT&E 882.7 7 1,054.1 - 986.5 6 - - 986.5 6
Procurement 712.0 46 5139 35 624.1 34 - - 62.1 М
Total 1,594.7 63 1,5680 % 1,6106 40 - - 16106 40
Note: The FY 2016 RDT&E includes 17 SM-3 Block ПА missiles. The FY 2018 RDT&E includes Numbers may not add due to rounding
6 SM-3 ПА missile. The FY 2016-2018 Procurement is comprised of SM-3 Block IB missiles.
* FY 2016 includes actuals for Base and OCO
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
MISSILE DEFENSE PROGRAMS
4-2
461 / 570
462 / 569
FY 2018 Program Acquisition Costs by Weapon System
THAAD Ballistic Missile Defense
The Terminal High Altitude Area Defense
(THAAD) is a key element of the Ballistic Missile
Defense System. The THAAD Battery will
provide transportable interceptors,
using “Hit-To-Kill” technology to destroy
ballistic missiles inside and outside the
atmosphere. A Battery consists of
6 truck-mounted launchers, 48 interceptors
(8 per launcher), І AN/TPY-2 radar,
and | Tactical Fire Control/Communications
component.
Mission: Provides Combatant Commanders with a deployable, ground-based missile defense
capability against short and medium-range ballistic missiles and asymmetric threats inside and
outside the atmosphere.
FY 2018 Program: Supports the procurement of 34 interceptors and associated
components, as well as support and training equipment. Continues fielding and sustainment
activities for seven THAAD Batteries. Continues development of THAAD software upgrades
to address threat packages, defense planning, improved capability to engage short-range ballistic
missiles, medium-range ballistic missile, limited intermediate-range ballistic missile threats, and
limited integration of the THAAD battery capability into the Integrated Air and Missile Defense
Battle Command System (IBCS) planning process.
Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA
Terminal High Altitude Area Defense (THAAD)
FY 2016* FY 2017** ae
Base Budget 0(0 Budget Total Request
M Qty M 0) M Qy M Qty $M Q
RDT&E 218.6 - 25 - 2664 - - - 104
Procurement | 4484) 343. 9 36 454 34 - - 516 34
Total 666.6 М4 181 y 118.0 34 - - 118.0 34
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
** FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
MISSILE DEFENSE PROGRAMS
4-3
462 / 570
FY 2018 Program Acquisition Costs by Weapon System
Io, Pm жар
Ground-based Midcourse Defense Тео... DO DD.
The Ground-based Midcourse Defense (GMD) element is a Missile
Defense Agency program and a key component of the Ballistic Missile
Defense System (BMDS), providing Combatant Commanders with the
capability to engage ballistic missiles in the midcourse phase of flight.
This phase, compared to boost or terminal, allows significant time for
sensor viewing from multiple platforms and, thus, provides multiple
engagement opportunities for hit-to-kill interceptors. The Ground-based
Interceptor (GBI) is made up of a three-stage, solid fuel booster and an
exoatmospheric kill vehicle. When launched, the multi-stage, solid fuel
booster missile carries the kill vehicle toward the target's predicted
location in space. Once released from the booster, the kill vehicle uses data 277”
received in-flight from ground-based radars and its own on-board sensors 7
to defeat the incoming missile by ramming the warhead with a closing
speed of approximately 15,000 miles per hour. Interceptors are currently
emplaced at Fort Greely, Alaska (AK), and Vandenberg Air Force Base
(AFB), California (CA). The GMD fire control centers are established in
Colorado and Alaska.
Mission: Provides the Combatant Commanders with the capability to
defend the United States, including Hawaii and Alaska, against long-range ballistic missiles during
the midcourse phase of flight.
FY 2018 Program: Continues to develop, operate, and sustain the GMD weapon system,
which includes the planned deployment of 40 Ground Based Interceptors (GBls) at Fort Greely,
AK, and 4 GBls at Vandenberg AFB, CA by CY 2017, for a total of 44 GBls. Funds Ground and
Flight testing (FTG-11) in support of the Integrated Master Test Plan (IMTP) requirements.
Continues the development of the GMD Redesigned Kill Vehicle (RKV) to include buildup of
RKV components and extensive testing in support of component level and system level Critical
Design Reviews (CDR) as well as RKV Alternative Seeker development. Begins replacing aging
ground system infrastructure: Command Launch Equipment, GMD Communications Network,
and In-Flight Interceptor Communications System (IFICS) Data Terminals and upgrades fire
control and kill vehicle (KV) software to improve discrimination capabilities.
Prime Contractor: Boeing Defense and Space; St. Louis, MO
Ground-based Midcourse Defense
FY 2016* FY 2017** 20l8
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 1,598.0 - 1,192.7 - 1,370.4 - - - 1,370.4
Total 1,598.0 - 1,192.7 - 1,370.4 - - - 1,370.4
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
** FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
MISSILE DEFENSE PROGRAMS
463 / 569
463 / 570
FY 2018 Program Acquisition Costs by Weapon System
The Army's Patriot air and missile
defense system, which includes the
Advanced Capability (PAC-3) missile,
is the only combat-proven system capable of
defeating Tactical Ballistic Missiles (TBMs),
Cruise Missiles, and Air-Breathing threats worldwide.
Joint efforts between the Army and the Missile
Defense Agency have been successful in integrating
PAC-3 capabilities into the Ballistic Missile Defense
System (BMDS). The PAC-3 units are the Combatant
Commanders' most capable asset to protect forward
deployed forces.
Mission: Contributes to the BMDS overall situational awareness for
short range terminal ballistic missile threats. Іс can cue other systems while protecting Joint
assets. The Patriot force is 15 battalions, and many remain forward stationed in multiple
theaters of operation.
FY 2018 Program: Continues improvements in software for further reduction to probability
of fratricide; improved communications, interoperability, supportability, electronic warfare
capabilities; and supports transition to the Integrated Air and Missile Defense (IAMD)
architecture.
Prime Contractors: Raytheon Integrated Defense Systems; Tewksbury, MA
Lockheed Martin Missiles and Fire Control; Dallas, TX
Patriot/PAC-3
FY 2016* FY 2017** EAE
Base Budget OCO Budget Total Request
$M Qty Mi Qy Я Qty M Qty SM 0
RDT&E 08.0 - 84.0 - 167.0 - - - 167.0
Procurement 242.0 - 425.0 58 329.1 - - - 39.
Spares 33.0 - 42 - 190 - - - 19.0
Total 363.0 - | 543.0 58 515.1 - - - ا5
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
** FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
MISSILE DEFENSE PROGRAMS
464 / 569 464 / 570
465 / 569
FY 2018 Program Acquisition Costs by Weapon System
PAC-3/MSE Missile
The Missile Segment Enhancement (MSE) is a
performance Improvement to the existing
Patriot Advanced Capability (PAC-3) missile.
The MSE upgrade enhances the PAC-3
missile by adding а dual pulse, | | -inch
diameter Solid Rocket Motor (SRM), improved lethality enhancer, a thermally hardened front-
end, upgraded batteries, enlarged fixed fins, more responsive control surfaces, and upgraded
guidance software. These improvements result in a more agile, lethal interceptor missile with
enhanced Insensitive Munitions (IM) compliance. The PAC-3 MSE can be fired from a Patriot
system.
Mission: Provides the Combatant Commanders with a hit-to-kill, surface-to-air missile that
can intercept tactical ballistic missiles, cruise missiles, and air-breathing threats that have
chemical, biological, radiological, nuclear, and conventional high explosive warheads. The MSE
extends the PAC-3 range, filling a critical performance gap, and affords greater protection for
U.S. and allied forces.
FY 2018 Program: Procures 93 MSE interceptors to increase range and altitude capability,
meeting the ever-changing threat.
Prime Contractor: Lockheed Martin Missiles and Fire Control; Dallas, TX
PAC-3/MSE
FY 2016* FY 2017 ae |
Base Budget OCO Budget Total Request
Mi Qty | Mi 0) | jM Qty Mi Qty М бу |
RDT&E 1) 5 Е А 5 я : А "ET
Procurement 5149 I2 10 06 | 459.0 93 - - 4 9
Total 517.1 l) 101 $ 4590 93 - - 490 B
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
MISSILE DEFENSE PROGRAMS
4-6
465 / 570
466 / 569
FY 2018 Program Acquisition Costs by Weapon System
Missiles and Munitions
Munitions is a general term for ammunition and missiles. Ammunition are explosives
consisting of all kinds of bombs, grenades, rockets, mines, projectiles, and other similar
devices. There are conventional and nuclear missiles used for both tactical and
strategic purposes. Many missiles are precision guided with the technical
sophistication to allow guidance corrections during flight-to-target. Some programs
include non-explosive articles that enhance the performance of other munitions. For
example, the Joint Direct Attack Munitions (JDAM) adds guidance capability when
attached to а gravity bomb, making it a “smart” bomb.
In FY 2018, the Department continues to execute a balanced munitions procurement
strategy in response to both current operations and advanced, long-term threats. The
Department is increasing procurement of JDAM, General Purpose Bombs, Small
Diameter Bombs, Guided Multi-Launch Rocket System, and the Hellfire missile to
ensure sufficiency for today's warfighter, while expanding industrial capacity to meet
increasing demands. In parallel, the Department continues to accelerate inventories of
the next generation of standoff weapons for high value land attack targets such as the
Joint Air-to-Surface Standoff Missile-Extended Range. Procurement of the Small
Diameter Bomb II provides an all-weather capability against moving targets. The Navy
will continue development of a Maritime Strike variant of Tactical Tomahawk to engage
surface threats, which supplements the air-launched Long Range Anti-Ship Missile
(LRASM), with the ability to engage heavily defended maritime targets at standoff ranges
and increased survivability. Investment also continues in shipboard air defense missiles
such as the Standard Missile-6 to enhance the ships survivability.
FY 2018 Missiles and Munitions - Total: $16.4 Billion
($ in Billions)
Conventional
Ammunition
$5.4
Tactical Missiles
$8.1
Strategic
Missiles
$2.9
Numbers may not add due to rounding MISSILES AND MUNITIONS
5-1
466 / 570
467 / 569
FY 2018 Program Acquisition Costs by Weapon System
USAF Image 8 |
The Advanced Medium Range Air-to-Air Missile (AMRAAM) is an all-weather, all-environment
radar guided missile developed to improve capabilities against very low-altitude and high-
altitude, high-speed targets in an electronic countermeasures environment. The AMRAAM is a
joint Navy/Air Force program led by the Air Force.
Mission: Destroys low and high altitude, high-speed enemy targets in an electronic
countermeasures environment. The AMRAAM is a fire-and-forget air-to-air missile, and has
replaced the AIM-7 Sparrow as the U.S. military's standard beyond visual range intercept
missile. The missile has undergone various service life improvements. The current
generation, AIM-120D, has a two-way data link, Global Position System-enhanced Inertial
Measurement Unit, an expanded no-escape envelope, improved High-Angle Off-Boresight
capability, and increased range over previous variants.
FY 2018 Program: Continues production as well as product improvements such as fuzing,
guidance, and kinematics.
Prime Contractor: Raytheon Company;Tucson, AZ
Advanced Medium Range Air-to-Air Missile
FY 2016* FY 2017** 08
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E
Air Force 46.2 - 62.5 - 613 - - - 61.3 -
Navy 302 - 40.4 - 254 - - - 254 -
Subtotal 164 - 1029 - E : Е ЕГЕ T
Procurement
Air Force 362.0 281 350.1 256 3043 205 - - 3043 205
Navy 202.8 158 204.7 163 197.1 120 - - 197.1 120
Subtotal — 5648 — 439 | 5548 419 501.4 325 - - 501.4 325
Spares 42 - 4.0 - 63 - - - 63 -
Total 645.4 439 661.7 419 5944 325 - - 594.4 325
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
MISSILES AND MUNITIONS
5-2
467 / 570
468 / 569
FY 2018 Program Acquisition Costs by Weapon System
Air Intercept Missile — 9X
USAF Image
The Air Intercept Missile-9X (AIM-9X), also known as SIDEWINDER, is a short range air-to-air
missile that provides launch-and-leave warfighting capability. Тһе AIM-9X/Block II features a fifth
generation staring focal plane array imaging infrared seeker with high off boresight capability. It
is mounted on a highly maneuverable (thrust vectored) airframe, along with digital guidance and
Infrared signal processing that results in enhanced acquisition ranges, improved IR counter-
countermeasures capability, and robust engagement zones for first shot/first kill air-to-air
performance. The AIM-9X is a joint Navy/Air Force program led by the Navy.
Mission: Destroys low and high altitude, high-speed enemy targets in an electronic
countermeasures environment.
FY 2018 Program: Continues AIM-9X Block II full rate production and planning/research for
future warfighting improvements.
Prime Contractor: Raytheon Missile Systems; Tucson, AZ
Air Intercept Missile — 9X
FY 2016* FY 2017** а -
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty м — Qty $M Qty
RDT&E
Air Force 33.6 - 529 - 350 - - - 35.0 -
Navy 591 - 563 - 42.9 - - - 42.9
Subtotal 92.7 - 109.2 - 11.9 - - - 11.9
Procurement
Air Force 198.2 506 1214 281 125.4 310 - - 125.4 310
Navy 92.5 201 10.9 152 19.1 185 - - 19.1 185
Subtotal — 290.1 113 198.3 439 205.1 495 - - 205.1 495
$pares 12.8 - 18.8 - 13.2 - - - 132 -
Total 396.2 713 326.3 439 296.2 495 - - 296.2 495
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-3
468 / 570
469 / 569
FY 2018 Program Acquisition Costs by Weapon System
Chemical Demilitarization
The Chemical Demilitarization Program (CDP) is composed
of two Major Defense Acquisition Programs, which are
the Assembled Chemical Weapons Alternatives (ACWA) )
Program and the U.S. Army Chemical Materials Activity, ;
both with the goal of destroying a variety of United States
chemical agents and weapons, including the
destruction of former chemical weapon
production facilities. The CDP is
designed to eliminate the existing U.S.
chemical weapons stockpile in compliance
with the Chemical Weapons Convention signed
111997 and the congressionally mandated destruction deadline of December 31, 2023 - while
ensuring the safety and security of the workers, the public, and the environment.
US Army Photo
Mission: There are three mission areas within the Chemical Demilitarization Program:
1. Destroy the remaining 10 percent of the U.S. chemical weapons stockpile at the ACWA
Program sites (Colorado and Kentucky);
2. Implement the Chemical Stockpile Emergency Preparedness Project (CSEPP) including
emergency response planning;
3. Assess and destroy Recovered Chemical Warfare Material (КСУУМ) within the United
States.
FY 2018 Program: Continues systemization activities and destruction operations at the
ACWA Program sites. Continues the CSEPP efforts and the emergency response planning at
Colorado and Kentucky. Sustains the crews, equipment, and management structure required to
ensure that the Department of Defense retains the capability to assess and destroy the RCWM
in the United States.
Prime Contractors: Bechtel National Incorporated; Pueblo, CO
Bechtel Parsons, Joint Venture; Richmond, KY
Chemical Demilitarization
РҮ 2016®*_ | FY 2017* ПЕНЕН NN
Base Budget 00 Budget Total Request
$M 0 $M Qy $MM Qi $MM 09 $M Qty
Chemical Agents and
- i 699.8 - 825.5 - 961.7 - - - 961.1 -
Munitions Destruction
Total 699.8 - 825.5 - | 961.1 - - - 961.1 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-4
469 / 570
470 / 569
FY 2018 Program Acquisition Costs by Weapon System
Joint Air to Surface Standoff Missile
USAF Image
The Joint Air-to-Surface Standoff Missile (JASSM) Baseline provides a survivable, precision cruise
missile to kill hard, medium, and soft targets. Іс is a 2,000-pound class weapon with a 1,000-
pound multi-purpose, hardened (blast/frag/penetrator) warhead. Тһе JASSM can cruise
autonomously in adverse weather, day or night, to defeat high value targets even when protected
by next generation defenses. The JASSM navigates to a pre-planned target using a Global
Positioning System-aided Inertial Navigation System and transitions to automatic target
correlation using an imaging infrared seeker in the terminal phase of flight. Maximum unclassified
range for the baseline JASSM variant is greater than 200 nautical miles. The JASSM is integrated
on the Е-15Е, F-16, B-52, В-І, and B-2 aircraft. Production of JASSM Baseline concluded in
FY201 6.
The JASSM-Extended Range (ER) increment is highly common with the JASSM Baseline variant,
and offers a more fuel-efficient engine and greater fuel capacity. Іс also adds 2.5 times the
standoff range at greater than 500nm. The JASSM-ER maintains the same outer mold line and
low-observable properties as JASSM Baseline, but replaces the turbojet engine (Teledyne) with
higher thrust, more fuel efficient turbofan engine (Williams International). The JASSM-ER is
currently only integrated on the В-| aircraft with integration on the F-I5E, F-16, B-52, and B-2
aircraft by FY 2020.
Mission: Destroys targets from a long-range standoff position deliverable by fighter and bomber
aircraft.
FY 2018 Program: Continues Full Rate Production for JASSM-ER.
Prime Contractor: Lockheed Martin Corporation;Troy, AL
Joint Air to Surface Standoff Missile
FY 2016* FY 2017** а,
Base Budget ОСО Budget Total Request
$M Qty 5М Qty $M Qty $M Qty $M Qty
RDT&E 92 - 30.0 - 29.9 - - - 29.9
Procurement 425.6 340 431.6 360 4414 360 - - 441.4 360
$pares 0.8 - 04 - 04 - - - 0.4 -
Total 435.6 340 462.0 360 411.7 360 - - 411.1 360
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-5
470 / 570
471 / 569
FY 2018 Program Acquisition Costs by Weapon System
Joint Direct Attack Munition
USAF Image
The Joint Direct Attack Munition (JDAM) is a joint Air Force and Navy program led by the Air
Force. The JDAM improves the existing inventory of general purpose gravity bombs by
integrating а Global Positioning System (GPS)/inertial navigation guidance capability that
improves accuracy and adverse weather capability.
A Laser JDAM (LJDAM) variant increases operational flexibility for an expanded target set.
The laser sensor kit added to the JDAM weapon kit provides the ability to attack targets of
opportunity, including land-moving and maritime targets, when designated by an airborne or
ground laser.
Mission: Enhances DoD conventional strike system capabilities by providing the ability to
precisely attack time-critical, high value fixed or maritime targets under adverse environmental
conditions and from all altitudes.
FY 2018 Program: Continues full-rate production of the system. The factory will operate at
the maximum rate of production.
Prime Contractor: The Boeing Company; St. Charles, MO
Joint Direct Attack Munition
FY 2016* FY 2017** де
Base Budget OCO Budget Total Request
$M 0у $M Qty $M Qty $M Qty $M Qty
RDT&E - - 10.0 - - - З Е
Procurement
Air Force 534.0 22418 107.1 30,664 319.5 10,330 390.6 16990 710.1 21,320
Navy 313 1,431 61.8 2,119 513 249 106.9 4111 164.2 1,109
Subtotal 565.3 23,9159 16859 33,443 31768 12,822 4975 21,707 8143 34,529
Total 565.3 23,915 7789 33,443 3168 12,822 4975 21,707 8743 34,529
* FY 2016 includes actuals for Base апа ОСО funds Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
MISSILES AND MUNITIONS
5-6
471 / 570
472 / 569
FY 2018 Program Acquisition Costs by Weapon System
Small Diameter Bomb (SDB)
The Small Diameter Bomb (SDB) II is a joint
Air Force and Navy program led by the Air Force
to provide a conventional small sized, precision guided,
standoff air-to-ground weapon that can be delivered
from both fighter and bomber aircraft.
The SDB | is a fixed target attack weapon.
The SDB-II incorporates a seeker and data link,
which expands the use to moving targets.
USAF Image
Mission: Destroys targets from a medium-range
standoff position deliverable by both fighter and bomber aircraft, with higher load-out and less
collateral damage compared to other weapons. SDB Il integration and testing activities
continue on the Ғ-ІБЕ aircraft.
FY 2018 Program: Continues Engineering and Manufacturing Development (EMD) and Low
Rate Initial Production of SDB Il missiles for use against moving, relocatable, and fixed targets.
The factory will operate at the maximum rate of production for SDB |.
Prime Contractor: Boeing Company; St. Charles, MO (SDB I)
Raytheon Missile Systems; Tucson, AZ (SDB II)
Small Diameter Bomb
FY 2016* FY 2017** Bee |
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E |
Air Force 28.0 - 548 - 390 - - - 39.0
Navy 55.8 - 91.6 - 91.6 - - - 9746
Subtotal 83.5 - 1524 - 136.6 - - - 136.6
Procurement
Air Force 135.1 3,494 260.2 4507 266.0 5,039 90.9 2,273 356.9 7,312
Spares 32 - 10.6 - 10.6 - 10.6 -
Total 222.1 3,494 423.2 45017 413.2 5,039 90.9 2,273 5041 120
* FY 2016 includes actuals for Base and OCO. Numbers may not add due to rounding
MISSILES AND MUNITIONS
5-7
472 / 570
FY 2018 Program Acquisition Costs by Weapon System
Hellfire Missiles
The Laser HELLFIRE II system family of
air-to-ground missiles (all variants) provides attack
helicopters and unmanned aircraft systems (UAS)
with point-target precision strike capability to defeat
heavy, advanced armor, individual hard point and
non-traditional targets. HELLFIRE Il missiles use a
semi-active laser terminal guidance and are the
primary armament of the AH-64 Apache, Army UAS
and Special Operations aircraft. The HELLFIRE Il
АСМ-114К is 64 inches in length and weighs 108 Ibs.
Weapons range is approximately 8 kilometers.
The HELLFIRE II missile includes Electro-Optical
Countermeasure capability, warhead
improvements and an updated electronic fuse.
The AGM-114R HELLFIRE II missile will be the single variant that replaces all other HELLFIRE Il
missile configurations (K/N/M/P).
Harvest Hawk
Mission: Engages and defeats individual moving or stationary ground targets such as armor,
mechanized, or vehicular targets, building, or bunkers.
FY 2018 Program: Continues at full-rate production. The factory will operate at the
maximum rate of production .
Prime Contractor: Lockheed Martin; Orlando, FL
Hellfire Missiles
FY 2016* FY 2017** БЕЛІҢ
Base Budget 0(0 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
uu ТР шы
Procurement
Army 863 33 498 400 948 998 2781 239] 31729 3,925
Air Force 691.1] 6,256 1191 1,536 34.9 39 2975 3,230 3324 9
Navy - - 8.6 100 - - 8.6 110 8.6 10
Total 184.0 6,639 685.5 5846 1297 1,397 5842 6,267 713.9 7,664
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
MISSILES AND MUNITIONS
5-8
473 / 569 473 /570
474 / 569
FY 2018 Program Acquisition Costs by Weapon System
The Javelin is highly effective against a
variety of targets at extended ranges
under day/night, battlefield obscurants,
adverse weather, and multiple counter-measure
conditions. The system's soft-launch feature
permits firing from enclosures commonly found in
complex urban terrain. The system consists of a
reusable command launch unit (CLU) and a modular
missile encased in a disposable launch tube
assembly. The CLU provides stand-alone all-weather
and day/night surveillance capability.
USMC Photo
Javelin provides precision effects in
either a top-attack or direct-attack mode
to defeat armored vehicles, fortifications and soft targets in full spectrum operations. It uses
an imaging infrared two-dimensional staring focal plane array seeker and a tandem warhead
with two shaped charges: a precursor warhead to defeat reactive armor, and a primary
warhead to penetrate base armor and other structures. Іс is effective against stationary and
moving targets.
Mission: Provides the dismounted soldier with a man-portable, fire-and-forget system that is
highly lethal against targets ranging from main battle tanks to fleeting targets of opportunity
found in current threat environments.
FY 2018 Program: Begins procurement of FGM-148F (F model) Javelin missiles with a new
Multi-Purpose Warhead, which improves lethality against exposed personnel. Continues
development of a lightweight CLU to reduce soldier burden and bulk.
Prime Contractor: Raytheon Missile Systems/Lockheed Martin Javelin Joint Venture;
Tucson, AZ and Orlando, FL
Javelin Advanced Anti-Tank Weapon System - Medium
FY 2016* FY 2017** Au
Base Budget OCO Budget Total Request
$M Qty $M Qty 5М Qty $M — 0 $M Qty
RDT&E 40 - 20.0 - 21.1 - - - 21.1 -
Procurement
Army 168.2 850 193.3 983 110.1 525 8.1 4] 118.2 572
Navy 58.9 321 19.6 524 412 22 28 lI 44.0 233
Subtotal 227.1 1,177 272.9 1,507 151.3 141 10.9 58 1622 805
Total 231.1 1,177 292.9 1,507 172.4 141 10.9 58 183.3 805
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-9
474 / 570
475 / 569
FY 2018 Program Acquisition Costs by Weapon System
Guided Multiple Launch Rocket System
The Guided Multiple Launch Rocket
System (GMLRS) provides a persistent,
responsive, all-weather,
rapidly-deployable and long range
precision strike capability.
The GMLRS is fired by the MI42 High
Mobility Artillery Rocket System
(HIMARS) and the M270A1 Multiple
Launch Rocket System (MLRS) launchers. The GMLRS uses an on-board Inertial Measurement
Unit (IMU) in combination with a Global Positioning System (GPS) guidance system to provide
improved performance. The missile has a range of approximately 70 kilometers and can carry a
variety of different warheads servicing point and area targets. Тһе third GMLRS increment,
GMLRS Alternative Warhead (AW), is in production and will replace GMLRS Dual Purpose
Improved Conventional Munition to meet requirements outlined in the 2008 Department of
Defense Cluster Munitions Policy. The GMLRS AW will be produced on a shared production
line and is about 9076 common with the GMLRS Unitary increment.
US Army Photo
Mission: Neutralizes or suppresses enemy field artillery and air defense systems and
supplements cannon artillery fires.
FY 2018 Program: Continues at full rate production of GMLRS (AVW/Unitary) as well as
product improvements such as insensitive munition development. The factory will operate at
the maximum rate of production. Facilitation will increase production capacity by FY 2020.
Prime Contractor: Lockheed Martin Corporation; Dallas, TX
Guided Multiple Launch Rocket System
FY 2016* FY 201 7** HELD
Base Budget OCO Budget Total Request
$M Qty $M Qty м Qy M Qy $M Qty
RDT&E 36.0 - 38.0 - 102.8 - - - 1024
Procurement 251.1 1,866 402.6 2,954 595.2 4458 1915 150 186.7 6,000
Total 287.1 1,866 440.6 2,954 698.0 4,458 191.5 1,542 889.5 6,000
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
MISSILES AND MUNITIONS
5-10
475 /570
476 / 569
FY 2018 Program Acquisition Costs by Weapon System
Rolling Airframe Missile
The Rolling Airframe Missile
(RAM) is a high firepower,
lightweight complementary
self-defense system to engage
anti-ship cruise missiles.
The systems design is based
upon the infra-red seeker of the
Stinger (FIM-92) missile, and the
warhead, rocket motor, and fuse
from the Sidewinder (AIM-9)
missile. The missile uses Radio
Frequency (RF) for midcourse
guidance, and transitions to
Infrared (IR) guidance for
terminal engagement. Currently there are two RIM-116 configurations: Block | (RIM-116B)
and Block 2 (RIM-1 6C).
Mission: Provides high firepower close-in defense of combatant and auxiliary ships by utilizing
a dual mode, passive radio frequency/infrared missile in a compact 21 missile launcher.
FY 2018 Program: Continues low rate of production for the Block И (RIM-I 16C) missile as
well as operational testing.
Prime Contractor: Raytheon Missile Systems; Tucson, AZ
Rolling Airframe Missile |
FY 2016* FY 2017** dis
Base Budget 0(0 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 23.8 - 18.1 - 412 - - - 412 -
Procurement 154 90 954 120 | 366 60 - - 58.6 60.0
Total 99.2 90 113.7 120 99.8 60 - - 99.8 60
*FY 20 | 6 includes actuals for Base and OCO Е m m Numbers may not add due to rounding
MISSILES AND MUNITIONS
5-11
476 / 570
FY 2018 Program Acquisition Costs by Weapon System
Standard Family of Missiles
US Navy Photo
Ке ж
a — l=
The Standard missile family consists of various air defense missiles including supersonic,
medium and extended range; surface-to-air. The Standard Missile-6 is a surface Navy Anti-Air
Warfare (AAWV) missile that provides area and ship self defense. The missile is intended to
project power and contribute to raid annihilation by destroying manned fixed and rotary wing
aircraft, Unmanned Aerial Vehicles (UAV), Land Attack Cruise Missiles (LACM), and Anti-Ship
Cruise Missiles (ASCM) in flight. It was designed to fulfill the need for a vertically launched,
extended range missile compatible with the Aegis Weapon System (AWS) to be used against
extended range threats at-sea, near land, and overland. The SM-6 combines the tested legacy of
STANDARD Missile-2 (SM-2) propulsion and ordnance with an active Radio Frequency (RF)
seeker modified from the AIM-120 Advanced Medium Range Air-to-Air Missile (AMRAAM),
allowing for over-the-horizon engagements, enhanced capability ас extended ranges, and
increased firepower.
Mission: Provides all-weather, anti-aircraft armament for cruisers and destroyers. The most
recent variant of Standard Missile is SM-6, which incorporates an AMRAAM seeker for
increased performance, including overland capability.
FY 2018 Program: Continues production of the SM-6 variant.
Prime Contractor: Raytheon Missile Systems; Tucson, AZ
Standard Family of Missiles
FY 2016* Ру 2017+ о
Base Budget 0С0 Budget Total Request
BRR
RDT&E ШЕ - 120,6 - 158.6 - 158.6 -
Procurement 4113 101 543.1 125 510.9 HT 352 8 546.1 125
Spares 17.1 - 19 - 15.0 - - - 15.0 -
Total 545.] 101 669.) 125 684.5 II 352 % 191 125
* FY 2016 includes actuals for Base and ОСО. Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-12
477 | 569 477 / 570
478 / 569
FY 2018 Program Acquisition Costs by Weapon System
Tactical Tomahawk Cruise Missile
Tomahawk is a long range cruise missile used for deep land-attack strike warfare that is
launched from U.S. Navy surface combatants and submarines. Tomahawk Block IV features an
improved navigation/guidance computer; robust anti-jam Global Positioning System (GPS)
capabilities; increased responsiveness and flexibility via satellite communications for in-flight
re-targeting; a loiter capability; and the ability to transmit a Battle Damage Indication (BDI)
prior to impact.
Block IV Tomahawk delivers a 1,000 Ib class unitary warhead at a range of 900 nm. Block IV
Tomahawk employs inertial guidance or GPS over water to follow a preset course; once over
land, the missile's guidance system is aided by Terrain Contour Matching (TERCOM). Terminal
guidance is provided by the Digital Scene Matching Area Correlation (DSMAC) system or GPS,
enabling highly accurate precision attack.
Mission: Provides precision strike against long and medium range tactical targets.
FY 2018 Program: Concludes production of Tomahawk Block IV missiles and continues
preparation for mid-life recertification commencing in FY 2019. Funds the development of a
maritime strike variant to engage surface targets.
Prime Contractor: Raytheon Missile Systems; Tucson, AZ
Tactical Tomahawk Cruise Missile
FY 2016* FY 2017** АЛЕ
Base Budget 0(0 Budget Total Request
08 Qty $M Оу Ж Qty $M Qty $M Qty
RDT&E 26.1 - 914 - 133.6 - - - 133.6 -
Procurement 2023 149 271.9 1% 1344 М 100.1 66 234.5 100
$pares 103 - 398 - 13.5 - - - BS -
Total 299.3 149 403.1 196 | 281.5 М 100.1 66 381.6 100
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
MISSILES AND MUNITIONS
5-13
478 / 570
479 / 569
FY 2018 Program Acquisition Costs by Weapon System
Trident II Ballistic Missile Modifications
The Trident ІІ (D5) is a submarine launched ballistic missile. It provides the most
survivable, second-strike capability in our nation’s nuclear Triad. The Trident Il
missile is carried on the OHIO-class Fleet Ballistic Missile Submarine. The
ongoing Life Extension Program (LEP) ensures viability of a highly
survivable strategic deterrent through 2042, providing the ability
to precisely attack time-critical, high value, fixed targets. The LEP
includes the procurement of missile electronic and guidance
Supportability Mods/Strategic Programs Alteration (SPALT) kits.
The importance of this program as a key component to the
sea-based leg of the nuclear triad was re-confirmed by the
President and Congress with the ratification of the
New START Treaty in 2011.
Mission: Aboard a virtually undetectable platform,
the submarine launched fleet ballistic missile deters
nuclear war by means of assured second-strike
capability in response to a major attack on the
United States or its allies.
NM.
>
US Navy Photo
FY 2018 Program: Funds the development of advanced components to improve the
reliability, safety and security of Arming, Fuzing and Firing systems and studies to support the
National Nuclear Security Administration УУ88 ALT 370. Funds the procurement of flight test
instrumentation, 12 Solid Rocket Motor sets, 12 Post Boost Control System Gas Generators,
various SPALT kits, support equipment, and spares.
Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA
Trident ІІ Ballistic Missile Mods
FY 2016* FY 2017** ibus
Base Budget OCO Budget Total Request
W Qty MQ 8 Я W $M Qty
RDT&E 93.4 - 134.0 - 126.4 - - - 126.4 -
Procurement 1,089.1 - 1,103.1 - 1,143.6 - - - 118.6 -
Total 1,182.5 - 0431 - 1,270.0 - - - 1,2700 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-14
479 / 570
480 / 569
FY 2018 Program Acquisition Costs by Weapon System
Offensive Anti-Ship Weapon (OASUW)
2
©Lockheed Martin www.NavyRecognition.com
The Offensive Anti-Ship Warfare (OASuW) Increment | is an accelerated acquisition program
to develop the Long-Range Anti-Surface Warfare Missile (LRASM). LRASM is a precision-
guided anti-ship missile with semi-autonomous guidance, day/night and all-weather capability.
LRASM integrates a multi-modal sensor suite, a weapons data-link, enhanced digital anti-jam
Global Positioning System capabilities, and а І,000ІЬ penetrator/blast fragmentation warhead.
Increment | provides Combatant Commanders the ability to conduct Anti-Ship Warfare
operations against high value surface combatants protected by Integrated Air Defense System
with long range surface-to-air missiles and denies the adversary sanctuary of maneuver. The
Increment | program has completed transition from Defense Advanced Research Projects
Agency to Navy leadership and is scheduled to field on the Air Force В-І Bomber by the end
of Fiscal Year 2018 and Ғ/А-ІЗЕ/Ғ by the end of Fiscal Year 2019. The OASuW Increment | isa
joint Navy/Air Force program led by the Navy.
Mission: Provide robust anti-surface warfare capability to ensure freedom of maneuver,
maintain sea lines-of-communication, and extend joint warfighter combat reach in contested
maritime environments.
FY 2018 Program: Continue low rate production, integration, and test phase of the air-
launched OASuW Increment | (LRASM) program.
Prime Contractor: Lockheed Martin Missiles and Fire Control Strike Weapons;
Orlando, FL
FY 2016* FY 2017** 8 |
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M — Qty $M Qty
RDT&E 348.1 - 2524 - 313.1 - - - 313.1 -
Procurement
Navy - - 29.6 10 14.1 25 - - 14.1 15
Air Force - - 59.5 20 44.1 15 - - 44.1 15
Subtotal - - 89.1 30 119.4 40 - - 119.4 40
| Total 348.7 - 341.5 30 432.5 40 - - 425 40
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
MISSILES AND MUNITIONS
5-15
480 / 570
481 / 569
FY 2018 Program Acquisition Costs by Weapon System
Ground Based Strategic Deterrent (GBSD)
The Ground Based Strategic Deterrent (GBSD) program is the Air Force
effort to replace the aging LGM-30 Minuteman Ш intercontinental ballistic
missile (ICBM). Тһе Minuteman ПІ missile fleet was fielded in the 1970s with
an initial 10-year service life, while its launch and command and control
systems date back to the 1960s. The new GBSD weapon system will meet
existing user requirements, while having the adaptability and flexibility to
affordably address changing technology and threat environments through
2075. Deployment is projected to begin in the late 2020s.
Mission: As a critical part of the nuclear triad, ICBMs provide land-based
strategic nuclear deterrence, assurance, and stability by providing a responsive
and resilient capability that assures allies they do not need to expand their
own capability, dissuade proliferation, deter adversaries, and, should
deterrence fail, decisively defeat adversary targets and retaliatory capabilities
as authorized and directed by the President. GBSD will continue to maintain
strategic stability at a reasonable cost, while hedging against potential
problems or vulnerabilities in other portions of the triad.
FY 2018 Program: Funds technology maturation and risk reduction
activities to deliver mature and integrated technologically to support the
preliminary design of the weapon system.
Prime Contractors: Currently in Source Selection to award up to two
Technology Maturation and Risk Reduction contracts.
Ground Based Strategic Deterrent (GBSD)
FY 201
FY 201 6% FY 2017% all
Base Budget 000 Budget
и еу по по $ 0
RDT&E 65.0 - 139 - 215.7
Procurement - - - ` °
Total 65.0 - 139 - 1 - -
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
MISSILES AND MUNITIONS
5-16
ii FY 2017 includes the Presidents Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
481 / 570
482 / 569
FY 2018 Program Acquisition Costs by Weapon System
Long Range Stand-Off (LRSO) Missile
Long Range Stand-Off (LRSO ) Missile is a nuclear cruise missile
capable of penetrating and surviving complex advanced
integrated air defense systems and GPS-denied environments
from significant standoff ranges. LRSO replaces the Air
Launched Cruise Missile (ALCM) which entered service in
1982 and is well past its original 10-year design service life.
LRSO details are classified to protect critical program
information.
Mission: The Long Range Stand Off cruise missile retains
penetrating and survivable capabilities in advanced Integrated Air
Defense Systems and GPS-denied environments from significant standoff ranges, ensuring we
maintain a credible deterrent. Combined with nuclear capable bombers, LRSO provides the
nuclear triad with a clear, visible, and tailorable deterrent to provide the President and U.S.
Forces the ability to project power and hold at risk any target at any location on the globe.
LRSO provides a hedge against future technological and geopolitical uncertainties. LRSO
provides a reliable cost-effective force multiplier for the B-52, B-2 and the B-21 bomber.
FY 2018 Program: Funds the development, design, and planning for test, integration,
qualification and nuclear certification activities. It continues funding for the Technology
Maturation Risk Reduction (TMRR) efforts to include the first TMRR design reviews. The next
major milestone after TMRR award is Milestone B and Engineering Manufacturing and
Development contract award in FY 2022.
Prime Contractors: Currently in Source Selection to award up to two Technology
Maturation and Risk Reduction contracts.
Long Range Stand-Off Missile (LRSO)
FY 2016* FY 2017** — € —
Base Budget 000 Budget Total Request
и Q и фу и y Mo O н (у
RDT&E 16.1 - 95.6 - 13 - - - 43
Procurement - - - - - - - -
Total 16.1 - 95.6 - | 413 - - - 1 -
* FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
*FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-17
482 / 570
483 / 569
FY 2018 Program Acquisition Costs by Weapon System
B61 Tail Kit Assembly (TKA)
The ВбІ is a nuclear gravity bomb developed
by the Department of Energy's National Nuclear
Security Administration (DOE/NNSA) for the
Department of Defense. Current versions in the
inventory were fielded between 1978-1990 and
require component refurbishment and replacement
to maintain a safe, secure and effective capability.
Mission: Provides the strategic weapons for the
airborne leg of the nuclear triad and are carried on the B-52, the B-2, and NATO dual-use
aircraft today. The new variant consolidates four versions and will be carried by the B-2 and
North Atlantic Treaty Organization (NATO) aircraft as well as the F-35 and the B-21 bomber.
To extend the life of this weapon, DOE/NNSA and the Air Force are jointly implementing a
Life Extension Program (LEP) to refurbish the B61 with a First Production Unit іп 2020. The
Air Force portion of the LEP is to provide the development, acquisition and delivery of a
guided tail kit assembly and all up round technical integration, system qualification and fielding
of the В61-12 variant.
FY 2018 Program: Funds the development, design, test, integration, qualification and nuclear
certification activities in support of the B61-12 LEP through continued Phase ІІ of engineering
and manufacturing development and prepare for the Milestone C decision in early FY 2019.
Continues software development and integration for the Ғ-ІБЕ and F-16 aircraft and begins
B-2 and PA-200 integration.
Prime Contractors: Boeing Company
В61 Tail Kit Assembly (ТКА)
FY 2016* FY 2017 dias
Base Budget 00 Budget Total Request
$M 0) jM и | MW 0) jM Qty 98 фу
RDT&E 204.4 - 137.9 - 712 - - - 91.2
Procurement - - - - 003 30 - - 883 30.0
Total 2044 - (379 - 1795 300 - - 1795 300
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
ж FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
MISSILES AND MUNITIONS
5-18
483 / 570
484 / 569
FY 2018 Program Acquisition Costs by Weapon System
Shipbuilding and Maritime Systems
A central principle to the United States Maritime Strategy is forward presence, which
promotes conflict deterrence by ensuring forces are in a position to expeditiously
respond to conflict. Therefore, sea services must procure, build, and maintain maritime
systems in accordance with mission need.
The Shipbuilding Portfolio for FY 2018 includes the funding for the construction of
12 ships (2 SSN 774 Virginia Class nuclear attack submarines; | СУМ 78 Ford Class
Aircraft Carrier; 2 DDG 51 Arleigh Burke Class destroyers; | Littoral Combat Ships
(LCS); | Fleet Replenishment Oiler; | Towing, Salvage and Rescue (TATS(X) ship;
| Landing Craft, and 3 Ship to Shore Connectors) and the second year of incremental
construction funding for | Amphibious Assault ship, USS Bougainville (НА 8). In
addition, the FY 2018 request includes funding for Advance Procurement to support
detail design activities and long lead items for the Columbia Class Fleet Ballistic Missile
Submarine (SSBN) and long lead item for the Refueling and Complex Overhaul of USS
John C. Stennis (CVN 74).
The funding in this category finances the developmental efforts, the equipment
procurements, and the construction of ships that will allow the U.S. Navy to maintain
maritime dominance and superiority well into the 2 15 century.
FY 2018 Shipbuilding and Maritime Systems – Total: $30.4 Billion
($ in Billions)
Surface
i i Technology
$14.6 Development
$2.4
Outfitting & Post
Delivery
$0.6
Support Ships
$0.4
Submarine
Combatant
ы $8.4
Numbers тау not add due to rounding
SHIPBUILDING AND MARITIME SYSTEMS
6-1
484 / 570
485 / 569
FY 2018 Program Acquisition Costs by Weapon System
John Lewis Class Fleet Replenishment Oiler
The Fleet Replenishment Oiler (T-AO)
program will build a new class of fleet и |" M pr у 4 №
oilers for the Navy. The lead ship in the == тес a MUN
class is USNS John Lewis (T-AO 205).
The T-AO will provide fuel and cargo
delivery to support fleet operations. d UNUM.
As compared to the previous class of
Oilers, this class has increased space for
dry cargo and a helicopter refueling а серо
capability. The John Lewis class will be built
with a double-hull to guard against oil spills
and to comply with international agreements concerning pollution from ships.
Mission: Transfers fuel and lubricants to Navy surface ships operating at sea to extend at-sea
time for the ships and embarked aircraft.
FY 2018 Program: Funds construction of one T-AO, continued development of ship systems,
and outfitting costs.
Prime Contractor: General Dynamics, National Steel and Shipbuilding Co.; San Diego, CA.
John Lewis Class Fleet Replenishment Oiler
FY 2016* FY 2017** BOE
Base Budget 0(0 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E - 11 - 20 - - - 2.0 -
Procurement 614.1 | 13.1 - 541.1 | - - 541.1 |
Total 674.1 | 14.2 - 543.1 | - - 543.1 |
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
я FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request юг Additional Appropriations (Base + OCO)
SHIPBUILDING AND MARITIME SYSTEMS
6-2
485 / 570
486 / 569
FY 2018 Program Acquisition Costs by Weapon System
CVN 78 Gerald R. Ford Class Nuclear Aircraft Carrier
Aircraft carriers are
the centerpiece of
U.S. Naval forces.
The CVN 78 class ships will
include new technologies and
improvements to improve efficiency
and operating costs as well as reduced
crew requirements. This new class brings
improved warfighting capability, quality-of-life
improvements for Sailors, and reduced total
ownership costs. USS Gerald R. Ford is the first aircraft carrier designed with all electric utilities,
eliminating steam service lines from the ship, reducing maintenance requirements and improving
corrosion control. The new AIB reactor, Electromagnetic Aircraft Launch System (EMALS),
Advanced Arresting Gear (AAG) and Dual Band Radar (DBR) all offer enhanced capability with
reduced manning. The ship's systems and configuration are optimized to maximize the sortie
generation rate (SGR) of attached strike aircraft.
Mission: Provides the United States with the core capabilities for forward presence,
deterrence, sea control, power projection, maritime security and humanitarian assistance. The
Gerald R. Ford class will be the premier forward asset for crisis response and early decisive
striking power in a major combat operation.
FY 2018 Program: Funds the first year of construction costs for USS Enterprise (CVN 80);
the final year of construction costs for USS John Е Kennedy (СУМ 79), outfitting, training, and
continued development of ship systems.
Prime Contractor: Huntington Ingalls Industries; Newport News, VA
CVN 78 Gerald R. Ford Class Nuclear Aircraft Carrier
FY 2016* FY 2017** EE. SENE
Base Budget 0(0 Budget Total Request
м 60у м Qy по M W $M Q
RDT&E 113.6 - ЛЕ - 138.1 - - - 138.1
Procurement 2,655.2 - 26696 - 4500 | - - 4500.0 |
Total 2,168.1 - 1191 - 4638.1 | - - 408 |
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
SHIPBUILDING AND MARITIME SYSTEMS
6-3
486 / 570
487 / 569
FY 2018 Program Acquisition Costs by Weapon System
DDG 51 Arleigh Burke Class Destroyer
The DDG 51 class guided missile
destroyers provide a wide range of
warfighting capabilities in multi-threat
air, surface, and subsurface environments.
The DDG 51 class ship is armed with
a vertical launching system, which
accommodates 96 missiles, and
a 5-inch gun that provides Naval Surface
Fire Support to forces ashore and anti-ship
gunnery capability against other ships.
This is the first class of destroyers i
with a ballistic missile defense capability. The Arleigh Burke class is comprised of four separate
variants; DDG 51-71 represent the original design, designated Flight | ships, and are being
modernized to current capability standards; DDG 72-78 are Flight ІІ ships; DDG 79-123
ships are Flight ПА ships; DDG 124-136 will be constructed as Flight Ш ships with the Air and
Missile Defense Radar (AMDR) capability.
US Navy Photo
Mission: Provides multi-mission offensive and defensive capabilities and can operate as part of
a carrier strike group or independently. Conducts Anti-Air Warfare, Anti-Submarine Warfare,
and Anti-Surface Warfare.
FY 2018 Program: Funds two Flight Ill DDG 51 class destroyers as part of a multiyear
procurement for ten ships from FY 2018 — FY 2022, outfitting costs, and continued
development of ship systems.
Prime Contractors: General Dynamics Corporation; Bath, ME
Huntington Ingalls Industries; Pascagoula, MS
DDG 51 Arleigh Burke Class Destroyer
FY 2016* FY 2017** ЕЕ
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 2131 - 1494 - 2882 - - - 288.2
Procurement 4266.8 3 3,348.9 2 3,725.6 2 - - 3,725.6 2
Total 4,540.5 j 3,4983 2 4013.7 2 - - 4,013.7 2
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
SHIPBUILDING AND MARITIME SYSTEMS
487 / 570
488 / 569
FY 2018 Program Acquisition Costs by Weapon System
Littoral Combat Ship (LCS)
The Littoral Combat Ship (LCS) is a
small surface combatant capable of operations 2.
eneral Dynamics
close to shore. The design emphasizes speed, independents Ce ie
4.14: ж уеп Numbers {
flexibility, and shallow draft. The LCS is
designed for operations in three primary
anti-access mission areas: Surface Warfare (SUW) š
operations emphasizing defeat of small boats,
Mine Warfare (MIW), and Anti-Submarine
Warfare (ASW). The ships are reconfigured
for various operational roles by changing the
mission module, each of which have mission
area-specific equipment, vehicles, and crews. Image courtesy
: Lockheed Martin
The modules are used to counter anti-access Freedom Class (LCS 1)
. . i Odd Numbers
threats close to shore such as mines, quiet diesel
submarines, and swarming small boats. The seaframe
acquisition strategy procures two seaframe designs which are a separate and distinct
acquisition program from the mission module program. The two programs are synchronized to
ensure combined capability.
Mission: Defeats asymmetric threats and assures naval and joint forces access into contested
littoral regions by prosecuting small boats and craft, conducting mine countermeasures, and
performing anti-submarine warfare.
FY 2018 Program: Funds construction of one LCS seaframe, outfitting, trainers, and
development costs for a new class of small surface combatant.
Prime Contractors: Lockheed Martin/Marinette Marine Corporation; Marinette, WI
Austal USA; Mobile, AL
Littoral Combat Ship
FY 2016* FY 2017** ЕСЕ |
Base Budget ОСО Budget Total Request
M бу $ — Qy $ и я Qy н бу
RDT&E 1284 - 1365 - 1844 - - - 184.4 -
Procurement 1,688.3 3 1,462.4 2 968.1 | - - 968.1 |
Total 1,816.7 3 1,598.9 2 1,152.6 | - - 1,152.6 |
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
SHIPBUILDING AND MARITIME SYSTEMS
488 / 570
FY 2018 Program Acquisition Costs by Weapon System
SSN 774 Virginia Class Submarine
The Virginia Class Submarine is a
multi-mission nuclear-powered
attack submarine that provides
the Navy with the capabilities
to maintain undersea
supremacy in the 215< century.
Characterized by advanced
stealth and enhanced features for
Special Operations Forces, this submarine is able to operate in deep water and littoral
environments. Equipped with vertical launchers and torpedo tubes, the submarine is able to
launch Tomahawk cruise missiles as well as heavyweight torpedoes.
US Navy Photo
Mission: Seeks and destroys enemy ships and submarines across a wide spectrum of scenarios,
working independently and in concert with a battle group, separate ships, and independent
units. Provides theater commanders with time sensitive critical information for accurate
knowledge of the battlefield.
FY 2018 Program: Funds two ships as part of a multiyear procurement contract, advance
procurement for two ships in future years, and outfitting and support equipment. Continues
funding the development of the Virginia Payload Module, technology, prototype components, and
systems engineering required for design and construction.
Prime Contractors: General Dynamics Corporation; Groton, CT
Huntington Ingalls Industries; Newport News, VA
SSN 774 Virginia Class Submarine
FY 2016* FY 2017** Е 208
Base Budget 0C0 Budget Total Request
| 5М Qty $M Qty $M Qy SM Qty $M Qty
RDT&E 305.1 - 208.5 - 190.3 - - - 190.3 -
Procurement 5,424.5 2 5,113.9 2 5,356.0 2 - - 5,356.0 2
Total 5,729.5 2 5,322.3 2 5,546.3 2 - - 5,546.3 2
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
SHIPBUILDING AND MARITIME SYSTEMS
6-6
489 / 569 489 / 570
FY 2018 Program Acquisition Costs by Weapon System
Ship to Shore Connector
The Ship to Shore Connector (SSC) is the
functional replacement for the existing fleet
of Landing Craft, Air Cushioned (LCAC) vehicles,
which are nearing the end of their service life.
The SSC is an air-cushioned landing craft intended
to transport personnel, weapon systems, equipment,
and cargo from amphibious vessels to shore.
The vessel can rapidly move assault forces to
conduct amphibious operations and operate
over the high water mark to include movements over
ice, mud, and swamps.
Image
courtesy of
the U.S. Navy
Mission: Transports vehicles, heavy equipment, and supplies through varied environmental
conditions from amphibious ships to shore. Enhances the Navy and Marine Corps capability to
execute a broad spectrum of missions from humanitarian assistance and disaster response to
multidimensional amphibious assault.
FY 2018 Program: Procures three vessels and continues research, development, and testing.
Prime Contractor: Textron Incorporated; New Orleans, LA
Ship to Shore Connector
FY 2016* FY 2017** Lec
Base Budget 00 Budget Total Request
м 05 W — Qty м Qy 5 0 $M — Qty
RDT&E 18 - ІШ - 224 - - - 22.4 -
Procurement 210.6 5 128.1 2 222.7 3 - - 2M1 3
Total 218.4 5 139.2 2 245.1 3 - - 245.1 3
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО)
SHIPBUILDING AND MARITIME SYSTEMS
6-7
490 / 569 490 / 570
491 / 569
FY 2018 Program Acquisition Costs by Weapon System
Columbia Class Ballistic Missile Submarine Program
The Columbia Class Ballistic Missile Submarine
is designed to replace the current Ohio class em
of Fleet Ballistic Missile Submarine (SSBN). Courtesy of
The USS Columbia program will deliver — U.S: Nawy
12 SSBNSs with the necessary capability
and capacity to meet the sea based strategic
deterrence mission beyond retirement of the
current submarine force and with sufficient mission
capability to counter credible threats through 2080.
Currently in the research and development stage, the Columbia
class requirements and specifications are being refined. The ships
will begin construction in FY 2021 for FY 2028 delivery when the first Ohio class ships are due
to be decommissioned. The nuclear propulsion systems will be acquired from the nuclear
industrial base under the direction of Naval Reactors, under U.S. Department of Energy
authorities. The program includes the development and construction of a Common Missile
Compartment (CMC) capable of hosting the existing TRIDENT Il missile system, which is
conducted jointly with the United Kingdom (UK) to support the SUCCESSOR class SSBN.
Mission: Provides a sea-based strategic nuclear force.
FY 2018 Program: Funds advance procurement for long-lead items, detail design, and
research and development of nuclear technologies and ship systems such as the propulsion
system, combat systems technology, and the common missile compartment.
Prime Contractor: Common Missile Compartment Design: General Dynamics; Groton, CT
Columbia Class Ballistic Missile SubmarineProgram
FY 2016* FY 2017** Да
Base Budget OCO Budget Total Request
$M Qty 5М Qty $M Qty $M Qty $M Qty
RDT&E 1,367.1 - 1,091.1 - 1,041.6 - - - 1,041.6 -
Procurement - - 173.1 - 842.9 - - - 842.9 -
Total 1,367.1 - 1,864.3 - 1,884.5 - - - 1,884.5 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
SHIPBUILDING AND MARITIME SYSTEMS
6-8
491 / 570
492 / 569
FY 2018 Program Acquisition Costs by Weapon System
CVN Refueling Complex Overhaul
The CVN Refueling Complex 7 «ди
Overhaul (КАСОН) Ше
extension program provides
for the modernization of
nuclear powered fleet aircraft
carriers. During the RCOH,
the nuclear fuel is replaced
and major system modernization
activities are implemented to
extend the useful operational
life of the ship. An RCOH is
performed midway through
the ship's lifespan, which,
for Nimitz class carriers, is approximately 25 years, and can take four years to complete.
Photo
Courtesy of
Northrop
Grumman
Mission: Refuel and upgrade the Nimitz class aircraft carriers at mid-life to ensure reliable
operations during the remaining ship life.
FY 2018 Program: Continues funding for the RCOH for USS George Washington (CVN 73)
and procurement of long-lead items and long-lead efforts for USS John C. Stennis (CVN 74)
scheduled to begin in FY 2020.
Prime Contractor: Huntington Ingalls Incorporated; Newport News, VA
CVN Refueling Complex Overhaul
FY 2016* FY 2017** EE
Base Budget 0(0 Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E : Е | U ; E - Е :
Procurement 612.6 | 1,991.8 - 1,680.8 - - - 1,680.8 -
Тота! 612.6 | 1,991.8 - 1,680.8 - - - 1,680.8 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO)
SHIPBUILDING AND MARITIME SYSTEMS
6-9
492 / 570
493 / 569
FY 2018 Program Acquisition Costs by Weapon System
LHA America Class Amphibious Assault Ship
USS America class ships are
large-deck, amphibious assault ships designed
to land and support ground forces.
This class can transport a combination
of helicopters and vertical
take off and landing aircraft. ,
The first two ships, America
(LHA 6) and USS Tripoli
(LHA 7), are designated as
Flight 0 Variants and include -
an enlarged hangar deck, enhanced aviation maintenance facilities, increased aviation fuel
capacity, and additional aviation storerooms as compared to the previous Tarawa (LHA 1) class
ships. USS Bougainville (LHA 8) will be designated the first Flight | ship and will reincorporate
a well deck for operational flexibility. The well deck will enable surface operations while
maintaining the aviation capabilities.
Mission: Provides forward presence and power projection as an integral part of joint,
interagency, and multinational maritime expeditionary forces. Operates for sustained periods
in transit to and operations in an Amphibious Objective Area to include the embarkation,
deployment, and landing of a Marine Landing Force and supporting forces by helicopters and
tilt rotors supported by Joint Strike Fighters F-35B.
FY 2018 Program: Continues construction funding of LHA 8, outfitting costs, and continuing
research and development efforts.
Prime Contractor: Huntington Ingalls Industries Incorporated; Pascagoula, MS
LHA America Class Amphibious Assault Ship
FY 2016* FY 2017** ИВО | 0 ENS
Base Budget OCO Budget Total Request
W 0 м Qty М оу Я Qy $M Qty
RDT&E 83 - 95 - 82 - - - 8.2 -
Procurement 4992 - 1,638.8 | 1,1401 - - - 1,740.1 -
Total 491.5 - 1,648.2 | 1,748.3 - - - 1,148.3 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
SHIPBUILDING AND MARITIME SYSTEMS
6-10
493 / 570
494 / 569
FY 2018 Program Acquisition Costs by Weapon System
Space Based Systems
Space assets support deployed U.S. forces by providing communications services,
navigation capabilities, and information collected by remote sensors such as weather
satellites and intelligence collection systems. Space forces contribute to the overall
effectiveness of U.S. military forces by acting as a force multiplier that enhances combat
power. This investment addresses growing threats, complicating an adversary's ability
to counter U.S. space superiority, while enhancing the Department's ability to identify,
characterize, and attribute all threatening actions in space. The capability to control
space contributes to achieving information superiority and battle space dominance.
Procurement of launch vehicles and launch services are typically funded 2 years prior to
launch. Generally speaking, the first two satellites of a new system are purchased
with Research, Development, Test and Evaluation (RDT&E) funding and the remainder
of the satellites are purchased with Procurement funding.
The FY 2018 budget highlights concludes incremental funding for procurement of the
Space Based Infrared System (SBIRS) space vehicles Geosynchronous Earth Orbit
(GEO)-5 and GEO-6, awarded June 2014; provides advance procurement for GEO-7 and
СЕО-8; continues funding for the production oversight of the Advanced Extremely High
Frequency (AEHF) space vehicles AEHF-5 and AEHF-6, and continues the Space
Modernization Initiative RDT&E activities. Also funds the procurement of Evolved
Expendable Launch Vehicle (EELV) Launch Services, specifically three launch vehicles, and
up to eight Launch Capability activities per year.
FY 2018 Space Based Systems - Total: $9.8 Billion
($ in Billions)
Support
$3.2
Satellites
$4.7
Launch
$1.9
Does not include MDA or S&T Space related funding
SPACE BASED SYSTEMS
7-1
494 / 570
FY 2018 Program Acquisition Costs by Weapon System
Advanced Extremely High Frequency
The Advanced Extremely
High Frequency (AEHF)
system will be a four satellite
constellation of communications
satellites in geosynchronous orbit
that will replenish the existing EHF system,
Military Strategic Tactical Relay (MILSTAR),
at a much higher capacity and data rate capability.
* 24-hour low, medium, and extended data rate satellite
connectivity from 65 N to 65 S latitude worldwide
* 8 full-time spot beam antennas @ 75 bps to 8.192 Mbps data rate
* 24time-shared spot beam coverages @ 75 bps to 2.048 Mbps data rate
* 2crosslink antennas per satellite (60 Mbps)
° AEHF-I, AEHF-2, and AEHF-3 are in orbit and operational
* The launch of AEHF-4 is planned for 2017; AEHF-5 and AEHF-6 are scheduled to replace
АЕНҒ-І and AEHF-2 at the end of their useful life
Mission: Provides survivable, anti-jam, low probability of detection/intercept, worldwide secure
communications for tactical and strategic users and provides additional protection for strategic
users against shocks from a nuclear attack. AEHF enables tactical users to obtain battlefield
maps, share targeting data, and conduct voice calls. AEHF is a collaborative program that also
includes resources for Canada, the United Kingdom, and the Netherlands.
FY 2018 Program: Continues funding for the production oversight of the space vehicles
AEHF-5 and AEHF-6, and continues selected MILSATCOM Space Modernization Initiative (SMI)
development activities which are focused on improving capabilities, to include AEHF system
operational resiliency.
Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA
Advanced Extremely High Frequency
FY 2016* FY 2017** PPP” | s
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 208.1 - 259.1 - 145.6 - - - 145.6
Procurement 3214 - 645.6 - 514 - - - 51.0
Total 535.5 - 904.7 - 202.6 - - - 202.6
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO)
SPACE BASED SYSTEMS
7-2
495 / 569 495 / 570
496 / 569
FY 2018 Program Acquisition Costs by Weapon System
Evolved Expendable Launch Vehicle
The Evolved Expendable Launch Vehicle (EELV)
provides to the Air Force, Navy, and the
National Reconnaissance Office (NRO),
and other government and commercial purchasers of
launch services medium to heavy lift class satellites.
* 70 consecutive successful national security space
(NSS) operational launches (as of March 19, 2017).
* TheAir Force certified SpaceX as an EELV provider
on May 19, 2015.
Mission: Provides launch services and capability for medium
to heavy class national security space satellites.
FY 2018 Program: Procures three Air Force launch
services. All three are planned for competition and which
are usually ordered no-later-than 24 months prior to the
planned mission unless additional first time integration is
needed; funds EELV Launch Capability (ELC) effort
including mission assurance, program management,
systems engineering, integration of the space vehicle with
the launch vehicle, launch site and range operations, and
launch infrastructure maintenance and sustainment.
Continues EELV launch service investment to provide
two commercially-viable, domestically-sourced space
launch service providers with the objective of eliminating
reliance on a foreign-made liquid rocket engine.
Delta IV
Heavy
Atlas V
Falcon 9
Photo
courtesy
Of SpaceX
Photos
courtesy
Of ULA
Prime Contractors: United Launch Alliance (ULA); Centennial, CO
SpaceX; Hawthorne, CA
Evolved Expendable Launch Vehicle
FY 2016* FY 2017** А.
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 2249 - 296.6 - 291.6 291.6 -
Procurement 1,250.9 4 1,506.4 5 1,563.9 3 1,563.9 3
Total 1,475.8 4 1,803.0 5 — 15 3 - - 1,8615 J
*FY 2016 includes actuals for Base and OCO
Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
SPACE BASED SYSTEMS
496 / 570
497 / 569
FY 2018 Program Acquisition Costs by Weapon System
Global Positioning System
The Global Positioning System (GPS)
provides world-wide, 24-hour a day, NDS 5
all weather 3-dimensional position, navigation, ^ (>... € - қы dia n
and precise timing (PNT) information for ; ; IN XEN Ф.
military and civil users. The GPS III
space vehicles will be fully backward
compatible with legacy signals while
delivering new capabilities and
enhancements to include a new
Galileo-compatible signal (civil), a
more powerful M-code (military) signal, and the possibility to on-ramp future capabilities. The
GPS Next Generation Operational Control System (OCX) will enable operational use of all
modernized GPS signals, as well as enabling improved PNT performance.
Mission: Provides worldwide PNT to military and civilian users.
FY 2018 Program: Funds launch campaign for GPS Ш Space Vehicles (SVs) 01 and 02, and
design maturation supporting SV 11+. Continues the development of GPS OCX Blocks | and 2,
and enhancements to the legacy Operational Control System prior to OCX delivery. Funds the
technology development and lead platform integration of Military GPS User Equipment (MGUE)
Increment |. Funds the GPS Program Office's responsibility as the Prime Integrator (Enterprise
Integration) to synchronize space, control, and user segment programs and manage civil/military
specifications and requirements.
Prime Contractors: GPS Ill: Lockheed Martin Corporation; Denver, CO
GPS OCX: Raytheon Company; Aurora, CO
GPS MGUE Inc |: L3 Interstate Electronics Corporation; Anaheim, CA
Rockwell Collins International; Cedar Rapids, IA
Raytheon Company; El Segundo, CA
Global Positioning System
FY 2016* FY 2017** аиы
Base Budget OCO Budget Total Request
$M 0 $MM — Qy $M Qty $M Qty $M Q
RDT&E 634.7 - 910.6 - 1,018.3 - - - 1,0183 -
Procurement 198.4 | 34.1 - 85.9 - - - 85.9 -
Total 833.1 | 1,004.7 - 1,1042 - - - 1,104.2 -
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding
**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
SPACE BASED SYSTEMS
497 / 570
498 / 569
FY 2018 Program Acquisition Costs by Weapon System
Space Based Infrared System (SBIRS)
Space Based Infrared System (SBIRS)
will field a four satellite constellation Б >
in Geosynchronous Earth Orbit (GEO) Е аы... of Lockheed Martin
and a two hosted payload constellation A; — es =
in Highly Elliptical Orbit (HEO) with АЎ A E > —s
an integrated centralized ground š — ;- 4 Z ss
station serving all SBIRS space elements. | |
The SBIRS is the follow-on system to the
Defense Support Program (DSP).
The GEO payload consists of a scanning infrared (IR) sensor, which provides a higher revisit
rate, and a staring IR sensor, which provides a higher fidelity and persistent coverage for areas
of interest. The HEO payload consists of a single IR sensor.
° The HEO-3 payload was delivered to the host satellite program in June 2013 and is now on
orbit; the HEO-4 payload was delivered in May 2015.
* The GEO-3 satellite is expected to be delivered from storage for launch as early as
November 2017 as SBIRS Flight 4 and the GEO-4 satellite was delivered directly from
production and launched on January 20, 2017 as SBIRS Flight 3.
e The GEO-5 and СЕО-6 satellites are scheduled to launch in 2021 and 2022 as
replenishment satellites for GEO-| and GEO-2 at the end of their useful lives.
Mission: Provides initial warning of strategic missile attack on the United States, its deployed
forces, and its allies. Supports missile defense, battlespace awareness, and technical intelligence.
FY 2018 Program: Concludes incremental funding for procurement of the space vehicles
GEO-5 and GEO-6, awarded June 2014; provides advance procurement for GEO-7 and GEO-8;
and funds ground segment development, and continues the Space Modernization Initiative (SMI)
development activities to reduce future production costs by improving insertion of new
technologies to replace obsolete parts and materials.
Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA
Space Based Infrared System
FY 2016* FY 2017** AE
Base Budget OCO Budget Total Request
$M Qty $M Qty $M Qty $M Qty $M Qty
RDT&E 291.5 - 218.8 - 311.8 - - - 311.8 -
Procurement 542.1 - 362.5 - 1,113.4 - - - 1,113.4 -
Total 8342 - 581.3 - 1,425.3 - - - 0414253 -
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding
= FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО)
SPACE BASED SYSTEMS
7-5
498 / 570
499 / 569
7-6
5 A
m
e = li :
А
КА < > С
STATES OY
This page intentionally left blank.
499 / 570
= А.
ج ў
144141111
11110 ШШ
ИИ»
ООО w
“ Е
A - — ы.
: ТАЛЫЫ 814111111! ret 1011111
ТТТ 201017 р 0 m
ШІНШІ
ОООО
500 / 57(
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
501 / 569 501 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
502 / 569 502 / 570
UNCLASSIFIED
The 60 Minute Network Security Guide
(First Steps Towards a Secure Network Environment)
Systems and Network Attack Center (SNAC)
October 16, 2001
Version 1.0
National Security Agency
9800 Savage Rd. Suite 6704
Ft. Meade, MD 20755-6704
SNAC.Guides@nsa.gov
Some parts of this document were drawn from Microsoft and
The SANS Institute copyright materials with their permission.
UNCLASSIFIED
503 / 569
503 / 570
Table 1:
TCP or UDP Servers to Completely Block at the Perimeter Router/Firewall
Portis) (Transport) | Server | Port(s) (Transport) | Serer |
12-6 &
3
ТІ (TCP z UDP) 2023 (TCP)
15 (TCP = UDP) 2115 (TCP)
u
2049 (TCP Е ОБР)
2583 (ТСР) WinCrash
3701 (TCP z DE]
2801 (ICE)
137 (ТСР s UDP) Тоска
138 (ТСР & UDP) netbios-dgm 5800 - 5899 (ТСР) winvnc web
server
37 (TCP в UDP) 2301 (TCP в UDP) compagdiag
т
m
139 (ТСР в UDP) 5900 - 5999 (TCP) | winne
UDP) xdmcp 6000 - 6063 (ТСР) X11 Window
System
177 (TCP
0
m
245 (ТСР = UDP) irc
512 (TCP) Subseven
513 (ТСР) 6776 (ТСВ) Subseven
513 (UDP) 7000 (ТСР) Subseven21
514 (TCP) rsh, кср, 12345 - 12346 NetBus
rdist, rdump, (TCP)
rrestore
515 (ТОР) Sracheldraht
1024 (ТСР) NetSpy 31337 - 31338 (ТСР Back Orifice
& UDP)
1045 (ТСР) Rasmin 32700 - 32900 (ТСР RPC services
a UDP)
33270 (ТСР) Trinity V3
[ — 1243 (IC) | Backdoorn-G | ăć
VooDoo Dii | | |
1348 (UDP) Back Orifice
DLL
ЕТР99СМР
а UDE)
1807 (TCB)
293 / 340 309 / 570
UNCLASSIFIED
Table of Contents
TABLE OF CONTENDS ——————————————— ÀSHnÓ 2
ludielUese,m—————————————————————— Á 4
GENERAL GUIDANCGE.................................... l... ...................................................................................... 5
SECURITY POLIC ЖЕКТЕ ТЕР ua e оао 5
OPERATING SYSTEMS AND APPLICATIONS: VERSIONS AND УРБАТЕЗ............. лилии 5
KNOW YOUR NETWORK uisus ossa pa адан ни citate e вино omo 6
TCP/UDP SERVERS AND SERVICES ON THE NETWORK ........... линии 6
PASSWORDS MENT cT 6
Do Мот RUN CODE FROM NON-TRUSTED SOURCES .............4..4401.2.4ТҮ8:020.006060. 802012010 tnter tnnt trennen ns 7
BLOCK CERTAIN E-MAIL ATTACHMENT TYPES ........ccccscscscssssesesesesesecsesavassesavavsssssesesecsesasassesesesecacsesaacseaeeeeaes 7
FOLLOW THE CONCEPT OF LEAST РБІМПЕСЕ..............аа а ааа а аа тата tnter а 7
APPLICATION AUDITING................. sical далда лады pr Dainese i Ue она sasaki 8
NETWORK PRINTER_..... И rep pU basa a aaa 8
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP).................. I n a tents 8
NETWORK SECURITY TESTING оное раба иран d Edd ean 8
PERIMETER ROUTERS AND FIREWALLS ............................................ u. nn nn nn nn nn nn nn u... ....... 9
HOST Е ҮК ЛОК ons о О Л ой О О О Г E 9
TCP/IP: Riz c ——————————————— 11
LOGGING AND DEBUGGING..........ccssscsssssssscscsesssssesesesesecseseseseesesssssssseseceseesasesessssesecescecsesssesaesesesecaeseeeceeaenens 19
GENERAL ize v VIN wie REM 21
WINDOWS NT 4.0 AND WINDOWS 2000 ....................2. .. cere rere .......а44.......... 22
SERVICE PACKS AND HOTFIXES оаа анна бырына қаттық ланды қылды Re ula E нинин ннан 22
LIST OF NT/WINDOWS 2000 SECURITY MEASURES.................. I 101 nnne tnnt tnter 23
MICROSOFT 2 dB vgle] le 25
UNIX NETWORKS isd asia aad ——————————— 25
STARTUP SCRIPTS se RT e Ri e a D atu 25
SERVIGES/PORES Sessa e Ea elect ce Fl sb ие Qu Edda 25
SYSTEM ТЕШӘ NR hua us tup E E E E nen DU айнадан 26
R COMMANDS RU dut Ims а Па aU nda NT RUM uu E uda a ana B 26
NETWORK CONFIGURATIONS гоа пае ое оао еа ене данене анана ae acetate Und uu adea 26
PATCHES ЕЕ e ЕВ ИЕККЕ 26
USER:AGGOUNTS аео ает putain ea 26
PERMISSIONS ы ыдыс SS ыды арыр ыл Ана ыбаа ылына 27
GRONIAT JOBS M RIP 27
CORE DUMPS е SS SE КИ н 27
NETWORK SERVICES C. ыы eh sea Sse n aa a ae a 27
oct PIE -——————— — ВЕ usuku 28
X-WINDOW EST eX Z2 S RM 28
DISTRIBUTED SERVER FUNCTIONS „ааа анааан надана ИЕККЕ ККЕ se Pu i rand 28
CHROOT ENVIRONMENTS.................. I ен нике ити n n nn нна YE ERU KE өнеді 29
INTERESTING FILES Wem RM 29
PERIPHERAL DEVICE Sirain оо ausum aaa ad maf ое а abis rasa amas абы 29
BUFFER OVERFLOWS о о ua cvs нысы аб ба Адан Ыйы на шд d Cinta EHE RUE 29
SYSTEM UTILITIES AND COMMANDS а.а аланла аана аакка нана ава аа ааа 29
CURRENT OS PACKAGES BERE 29
Rime ES NL D ЕКЕЛУ КК cT 30
UNIX WEB SERVERS.......... арында санына ынаны: 31
UNCLASSIFIED 2
504 / 569 504 / 570
UNCLASSIFIED
(GENERAL GUIDANGE qaf ans —————————————————— م НЕ 31
EXAMPLE: (APACHE J кез НА و О О Г ГУС. 31
INTRUSION DETECTION SYSTEMS (IDS) ............................................-.-- Н 33
STEP 1 - IDENTIFY WHAT NEEDS ТО ВЕ РЕОТЕСТЕО............ненененененненененененнне 33
STEP 2 - DETERMINE WHAT TYPES OF SENSORS ARE REQUIRED ................м.. лымы 33
STEP З - CONFIGURE HOST SYSTEM SECURELY .........:. еее ы. 33
STEP 4 - KEEP SIGNATURE DATABASE CURRENT ................ М е лчееее г ы. 33
STEP 5 - DEPLOY IDS SENSORS Неее ne no сода Egg o RA SER ӨЙ a ao ae e 33
STEP 6 - MANAGEMENT AND CONFIGURATION ....................4 4441. із рге ерегес ини иене ныны ныны 35
UNCLASSIFIED 3
505 / 569 505 / 570
506 / 569
UNCLASSIFIED
Introduction
During the last four years the National Security Agency's Systems and Network Attack Center
(C4) has released Security Guides for operating systems, applications and systems that
operate in the larger IT network. These security guides can be found at our web site
www.nsa.gov / Security Recommendation Guides. Many organizations across the
Department of Defense have used these documents to develop new networks and to secure
existing IT infrastructures. This latest Security Guide addresses security a bit differently. Our
goal is to make system owners and operators aware of fixes that become "force multipliers" in
the effort to secure their IT network.
Security of the IT infrastructure is a complicated subject, usually addressed by experienced
security professionals. However, as more and more commands become "wired", an
increasing number of people need to understand the fundamentals of security in a networked
world. This Security Guide was written with the less experienced System Administrator and
information systems manager in mind, to help them understand and deal with the risks they
face.
Opportunistic attackers routinely exploit the security vulnerabilities addressed in this
document, because they are easily identified and rarely fixed. ISSMs, ISSOs and System
Administrators provide a level of risk management against the multitude of vulnerabilities
present across the IT infrastructure. The task is daunting when considering all of their
responsibilities. Security scanners can help administrator identify thousands of
vulnerabilities, but their output can quickly overwhelm the IT team's ability to effectively use
the information to protect the network. This Security Guide was written to help with that
problem by focusing the experience our research and operational understanding of the DoD
and other US Government IT infrastructures.
This Security Guide should not be misconstrued as anything other than security "best
practices" from the National Security Agency's Systems and Network Attack Center (C4). We
hope that the reader will gain a wider perspective on security in general, and better
understand how to reduce and manage network security risk.
We welcome your comments and feedback. SNAC.Guides@nsa.gov
UNCLASSIFIED 4
506 / 570
507 / 569
UNCLASSIFIED
General Guidance
The following section discusses general security advice that can be applied to any network.
Security Policy
(This section is an abstract of the security policy section of RFC 2196, Site Security
Handbook. Refer to this RFC for further details.)
A security policy is a formal statement of the rules that people who are given access to an
organization's technology and information assets must abide. The policy communicates the
security goals to all of the users, the administrators, and the managers. The goals will be
largely determined by the following key tradeoffs: services offered versus security provided,
ease of use versus security, and cost of security versus risk of loss.
The main purpose of a security policy is to inform the users, the administrators and the
managers of their obligatory requirements for protecting technology and information assets.
The policy should specify the mechanisms through which these requirements can be met.
Another purpose is to provide a baseline from which to acquire, configure and audit computer
systems and networks for compliance with the policy. In order for a security policy to be
appropriate and effective, it needs to have the acceptance and support of all levels of
employees within the organization.
A good security policy must:
m Бе able to be implemented through system administration procedures, publishing of
acceptable use guidelines, or other appropriate methods
m Ве able to be enforced with security tools, where appropriate, and with sanctions, where
actual prevention is not technically feasible
m Clearly define the areas of responsibility for the users, the administrators, and the
managers
m Be communicated to all once it is established
m Бе flexible to the changing environment of a computer network since it is a living
document
Operating Systems and Applications: Versions and Updates
As much as possible, use the latest available and stable versions of the operating systems
and the applications on all of the following computers on the network: clients, servers,
Switches, routers, firewalls and intrusion detection systems. Keep the operating systems and
the applications current by installing the latest updates (e.g., patches, service packs,
hotfixes), especially updates that correct vulnerabilities that could allow an attacker to
execute code. Note that some updates may not be applied to the computer until a reboot
occurs. The following applications should be given particular attention because they have
been frequently targeted (e.g., by CodeRed, Melissa virus, Nimda): IIS, Outlook, Internet
Explorer, BIND and Sendmail.
UNCLASSIFIED 5
507 / 570
508 / 569
UNCLASSIFIED
Know Your Network
Developing and maintaining a list of all hardware devices and installed software is important
to the security of the IT infrastructure. Understanding software applications that are installed
by default is also important (e.g., IIS is installed by default by SMS and SQL Server on
Windows platforms). A quick method for taking inventory of services running on the network
is to port scan.
TCP/UDP Servers and Services on the Network
Scan the network for all active TCP/UDP servers and services on each computer in the
network. Shut down unnecessary servers and services. For those servers that are
necessary, restrict access to only those computers that need it. Turning off functional areas,
which are seldom used but have vulnerabilities, prevents an attacker from being able to take
advantage of them. Other applications install with sample CGI scripts, which sometimes
contain problems. As a general rule do not install sample applications in production systems.
Passwords
Poor password selection is frequently a major problem for any system's security. Users
should be forced to change their passwords regularly. Set up password aging via Account
Policy for Windows systems or the /etc/default/passwd file in UNIX. Administrators
should obtain and run password-guessing programs (i.e., “John the Ripper," “LOphtCrack,”
and “Crack”) frequently to identify those users having easily guessed passwords. Because
password cracking programs are very CPU intensive and can slow down the system on
which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM
database for Windows and the /etc/passwd and /etc/shadow files in UNIX) to a stand-
alone (not networked) system. Also, by doing the work on a non-networked machine, any
results found will not be accessible by anyone unless they have physical access to that
system.
Passwords should:
m Ве 120r more characters in length on Windows systems, 8 characters in length on UNIX
m Include upper and lower case letters, numbers, and special characters
m Not consist of dictionary words
m Ве changed regularly (every 30 to 90 days)
m For UNIX, be encrypted and stored in the /etc/shadow file (for some UNIX systems) with
permissions set to 400 with ownership by root and group sys. The /etc/passwd file
should have permissions 644 with owner root and group root.
m Ве cracked every month to find users choosing easily guessed or cracked passwords
For UNIX, lock the following accounts by placing a *LK* in encrypted password field in
letc/shadow: adm, bin, daemon, listen, Ip, nobody, noaccess, nuucp, smtp, sys, uucp. These
accounts should not have login shells, rather they should be set to /dev/null.
UNCLASSIFIED 6
508 / 570
509 / 569
UNCLASSIFIED
Do Not Run Code From Non-Trusted Sources
For the most part, software applications run in the security context of the person executing
them without any consideration to source. А РКІ infrastructure may help, but when not
available remember that spoofing the “From” line of an e-mail message and disguising URLs
are trivial. DO NOT OPEN E-MAIL ATTACHMENTS OR RUN PROGRAMS UNLESS THE
SOURCE AND INTENT ARE CONFIRMED AND TRUSTED. Always run Outlook so that it
executes in the restricted zone and disable all scripting and active content for that zone. For
more specific details, reference "E-mail Client Security in the Wake of Recent Malicious Code
Incidents" available at http://www.nsa.gov.
Block Certain E-Mail Attachment Types
There are numerous kinds of executable file attachments that many organizations do not
need to routinely distribute via e-mail. If possible, block these at the perimeter as а
countermeasure against the malicious code threat. Organizations using Outlook can also
block them using Outlook 2002 or, for earlier versions of Outlook, using the appropriate
security patches.
The specific file types that can be blocked are:
„баз .hta .msp „п
.bat inf .mst .vb
.chm ins pif .vbe
.cmd Asp ірі .vbs
.com js гед .WS
.cpl jse .scr .WSC
crt Ink „вс! .wsf
.exe .msi .shs .wsh
It may be prudent to add, or delete files from this list depending upon operational realities.
For example, it may be practical to block applications within the Microsoft Office family, all of
which can contain an executable component. Most notable are Microsoft Access files, which
unlike other members of the Office family have no intrinsic protection against malicious
macros.
Follow The Concept Of Least Privilege
Least privilege is a basic tenet of computer security that means users should be given only
those rights required to do their job. Malicious code runs in the security context of the user
launching the code. The more privileges the user has, the more damage the code can do.
Recommendations pertaining to the least privilege principle include:
о Keep the number of administrative accounts to a minimum
а Administrators should use a regular account as much as possible instead of logging
in as administrator or root to perform routine activities such as reading mail
о Set resource permissions properly. Tighten the permissions on tools that an attacker
might use once he has gained a foothold on the system, e.g., explorer.exe,
regedit.exe, poledit.exe, taskman.exe, at.exe, cacls.exe,
cmd.exe, finger.exe, ftp.exe, nbstat.exe, net.exe, netl.exe,
netsh.exe, гср.ехе, regedt32.exe, regini.exe, regsvr32.exe,
rexec.exe, rsh.exe, runas.exe, runonce.exe, svrmgr.exe,
sysedit.exe, telnet.exe, tftp.exe, tracert.exe, usrmgr.exe,
UNCLASSIFIED 7
509 / 570
510 / 569
UNCLASSIFIED
wscript.exe, and xcopy.exe. Unix tools or utilities that should be restricted are
debuggers, compilers, and scripting languages such as gcc, регі, etc.
Q The least privilege concept also applies to server applications. Where possible, run
services and applications under a non-privileged account.
Application Auditing
Most server-level applications have extensive auditing capabilities. Auditing can be of value
in tracking down suspected or actual intrusions. Enable auditing for server applications and
audit access to key files (such as those listed above) that an attacker might use once he has
gained a foothold on a compromised server.
Network Printer
Today's network printers contain built-in FTP, WEB, and Telnet services as part of their OS.
Enabled network printers can be readily exploited and are often overlooked by system
administrators as a security threat. These network printers can and are often exploited as
FTP bound servers, Telnet jump-off platforms, or exploited by web management services.
Change the default password to a complex password. Explicitly block the printer ports at the
boundary router/firewall and disable these services if not needed.
Simple Network Management Protocol (SNMP)
SNMP is widely used by network administrators to monitor and administer all types of
computers (e.g., routers, switches, printers). SNMP uses an unencrypted "community string"
as its only authentication mechanism. Attackers can use this vulnerability in SNMP to
possibly gather information from, reconfigure or shut down a computer remotely. If an attack
can collect SNMP traffic on a network, then he can learn a great deal about the structure of
the network as well as the systems and devices attached to it.
Disable all SNMP servers on any computer where it is not necessary. However, if SNMP is a
requirement, then consider the following. Allow read-only access and not read-write access
via SNMP. Do not use standard community strings (e.g., public, private). If possible, only
allow a small set of computers access to the SNMP server on the computer.
Network Security Testing
Test regularly the security of all of the following computers on the network: clients, servers,
switches, routers, firewalls and intrusion detection systems. Also, do this after any major
configuration changes on the network.
UNCLASSIFIED 8
510 / 570
511 / 569
UNCLASSIFIED
Perimeter Routers and Firewalls
The following section addresses recommendations for securing network perimeter routers
and firewalls.
Host Security
Recommendations for improved host security include:
а
Shut down unneeded TCP/UDP servers (e.g., bootps, finger) on the router ог the
firewall. Servers that are not running cannot break. Also, more memory апа
processor slots are available with less servers running.
For TCP/UDP servers on the router or the firewall that are necessary, make sure that
access to them is limited only to the administrators.
Shut down unneeded services (e.g., source routing, remote configuration) on the
router or the firewall.
Disable any unused interface on the router or the firewall. Protect each and every
active interface on the router or the firewall from information gathering and attacks.
Protect each and every management port on the router or the firewall from attacks.
Disable any unused management port.
Configure durable passwords on the router or the firewall. For each password use
the following guidelines: be at least eight characters long, not be words, not begin
with a number, and include at least one character from the sets of letters, numbers
and all other characters (e.g. ,/«»;"[M)-!(QZ$96^&*() +`-= ). Consider using
different passwords for each router and each firewall. Change passwords at least
once every 90 days.
Example: Cisco IOS Routers
The following scenario steps through the recommendations listed above.
The show processes command can help to show active information about the servers on
the router. The following commands show how to disable the following servers:
TCP/UDP small servers (echo, discard, daytime, chargen), bootps, finger, http, identd
and snmp.
Router(config)f no service tcp-small-servers
Router (config)# no service udp-small-servers
Router (config)# no ip bootp server
Router (соп 194) # no service finger
Router (соп 19) # no ip http server
Router (соп 19) # no ір identd
Router (config) # no snmp-server community «community string»
If SNMP on the router is required, use the following commands to clear out any SNMP
servers with default community strings.
Router (соп 194) # no snmp-server community public
UNCLASSIFIED 9
511/570
512 / 569
UNCLASSIFIED
Router (config) # no snmp-server community private
Then set up the SNMP server with a community string that is difficult to guess. Also, if
possible, allow only read-only access to the server; do not allow read-write access to the
server. Apply an access-list to the server. Refer to the following section on TCP/IP
Filters for discussion of an access-list for SNMP in more detail. The following command
is an example.
Router (config) # snmp-server community S3cr3t-strin9 ro 10
The following commands disable the following services: Cisco Discovery Protocol (CDP),
remote configuration downloading, source routing and zero subnet.
Router (соп 19) # по cdp run
Router (соп 194) # no service config
Router (config) # по ip source-route
Router (соп 19) # по ip subnet-zero
The following command disables a router interface.
Router (config-if)# shutdown
Secure each and every active interface on the router from Smurf attacks, ad-hoc routing
and access-list queries with the following commands.
Router (config-if)# no ip directed-broadcast
Router (config-if)# no ip proxy-arp
Router (config-if)# no ip unreachables
Configure the console line () and the virtual terminal lines () on the router to time out a
session, to require a password at login and to allow only telnet traffic. If the auxiliary line
() is not needed, then it should be disabled. Use the following line configuration
commands to configure the lines.
Router (config) # line con 0
Router (config-line)# exec-timeout 5 0
Router (config-line) # login
Router (config-line)# transport input telnet
Router (соп 194) # line aux 0
Router (config-line)# no exec
Router (config-line) # exec-timeout 0 5
Router (config-line) # no login
Router (config-line)# transport input none
Router (соп 19) # line vty 0 4
UNCLASSIFIED 10
512 / 570
513 / 569
UNCLASSIFIED
Router (config-line)# exec-timeout 5 0
Router (config-line) # login
Router (config-line)# transport input telnet
Configure the Enable Secret password, which is protected with an MD5-based algorithm.
The following global configuration command is an example.
Router (соп 19) # enable secret 0 2manyRt3s
Configure passwords for the console line, the auxiliary line and the virtual terminal lines.
Use a different password for the console line and the auxiliary line versus the virtual
terminal lines. The following line configuration commands are examples.
Router (config) # line con 0
Router (config-line)# password Soda-4-jimmY
Router (соп 194) # line aux 0
Router (config-line)# password Popcorn-4-sara
Router (соп 19) # line vty 0 4
Router (config-line)# password Dots-4-georg3
Provide a basic protection for the line passwords by using the following global
configuration command.
Router (config)# service password-encryption
TCP/IP Filters
Carefully consider which TCP/IP services will be allowed through and to the perimeter routers
and firewalls (inbound and outbound). Use the following guidelines for creating filters: those
services that are not explicitly permitted are prohibited. The following tables present common
services to restrict because they can be used to gather information about the protected
network or they have weaknesses that can be exploited against the protected network.
Table 1 lists those TCP or UDP servers that should be completely blocked at the
perimeter router or firewall. These services should not be allowed across the router or
the firewall in either direction. Also, they should not be allowed to the router or the
firewall.
Table 2 lists those TCP or UDP servers on the protected network, on the router or on the
firewall that should not be accessible by external clients.
Table 3 lists the common TCP or UDP servers on the protected network, on the router or
on the firewall that may need some access by internal or external clients and servers.
Many of these services can be filtered to the few authorized computers (e.g., ftp server,
mail server, domain name server, web server) on the protected network or on the DMZ
subnet.
Table 4 lists the ICMP message types that can be allowed outbound from the protected
network, while all other message types should be blocked.
UNCLASSIFIED 11
513 / 570
UNCLASSIFIED
m Table 5 lists the ICMP message types that can be allowed inbound to the protected
network, while all other message types should be blocked.
In general, the administrator should create filters focusing on what services and hosts are
permitted and denying everything else. This method means that one may not need to block
each service in the tables below with a specific filter statement. Finally, use an intrusion
detection system on the protected network to monitor the TCP/IP traffic that is allowed past
the perimeter routers and firewalls.
UNCLASSIFIED 12
514 / 569 514 / 570
515 / 569
UNCLASSIFIED
Table 1:
TCP or UDP Servers to Completely Block at the Perimeter Router/Firewall
Port(s) (Transport) Server Port(s) (Transport) Server
1 (TCP & UDP) tcpmux 1981 (TCP) Shockrave
7 (TCP & UDP) echo 1999 (TCP) BackDoor
9 (TCP & UDP) discard 2001 (TCP) Trojan Cow
11 (TCP & UDP) systat 2023 (TCP) Ripper
13 (TCP & UDP) daytime 2049 (TCP & UDP) nfs
15 (TCP & UDP) netstat 2115 (TCP) Bugs
17 (TCP & UDP) qotd 2140 (TCP) Deep Throat
19 (TCP & UDP) chargen 2222 (ТСР) Subseven21
37 (TCP & UDP) time 2301 (TCP & UDP) compaqdiag
43 (TCP & UDP) whois 2565 (TCP) Striker
67 (TCP & UDP) bootps 2583 (TCP) WinCrash
68 (TCP & UDP) bootpc 2701 (TCP & UDP) sms-rcinfo
69 (UDP) tftp 2702 (TCP & UDP) sms-remctrl
93 (ТСР) supdup 2703 (TCP & UDP) sms-chat
111 (TCP & UDP) sunrpc 2704 (TCP & UDP) sms-xfer
135 (TCP & UDP) loc-srv 2801 (ТСР) Phineas P.
137 (TCP & UDP) netbios-ns 4045 (UDP) lockd
138 (TCP & UDP) netbios-dgm 5800 - 5899 (ТСР) winvnc web
server
139 (TCP & UDP) netbios-ssn 5900 - 5999 (ТСР) winvnc
177 (TCP & UDP) xdmcp 6000 - 6063 (ТСР) X11 Window
System
445 (TCP & UDP) microsoft-ds 6665 - 6669 (TCP) irc
512 (TCP) rexec 6711 - 6712 (ТСР) Subseven
513 (TCP) rlogin 6776 (TCP) Subseven
513 (UDP) who 7000 (TCP) Subseven21
514 (TCP) rsh, rcp, 12345 - 12346 NetBus
rdist, rdump, (TCP)
rrestore
515 (TCP) lpr 16660 (ТСР) Stacheldraht
517 (UDP) talk 27444 (UDP) Trinoo
518 (UDP) ntalk 27665 (TCP) Trinoo
540 (ТСР) uucp 31335 (UDP) Trinoo
1024 (TCP) NetSpy 31337 - 31338 (TCP Back Orifice
& UDP)
1045 (TCP) Rasmin 32700 - 32900 (TCP RPC services
& UDP)
1090 (TCP) Xtreme 33270 (TCP) Trinity V3
1170 (ТСР) Psyber S.S. 39168 (ТСР) Trinity V3
1234 (TCP) Ultors Trojan 65000 (ТСР) Stacheldraht
1243 (TCP) Backdoor-G
1245 (TCP) VooDoo Doll
1349 (UDP) Back Orifice
DLL
1492 (TCP) FTP99CMP
1600 (TCP) Shivka-Burka
1761 - 1764 (ТСР sms-helpdesk
& UDP)
1807 (TCP) SpySender
UNCLASSIFIED
13
515 / 570
516 / 569
UNCLASSIFIED
Table 2:
TCP or UDP Servers to Block at the Perimeter Router/Firewall from External Clients
TCP or UDP Servers to Allow Limited Access at the Perimeter Router/Firewall
Port(s) (Transport) Server
79 (TCP) finger
161 (TCP & UDP) snmp
162 (TCP & UDP) snmp trap
514 (UDP) syslog
550 (TCP & UDP) new who
Table 3:
Port(s) (Transport) Server
20 (ТСР) ftpdata
21 (TCP) ftp
22 (TCP) ssh
23 (ТСР) telnet
25 (TCP) smtp
53 (TCP & UDP) domain
80 (TCP) http
110 (ТСР) pop3
119 (TCP) nntp
123 (TCP) ntp
143 (TCP) imap
179 (TCP) bgp
389 (TCP & UDP) ldap
443 (TCP) ssl
1080 (TCP) socks
3128 (TCP) squid
8000 (TCP) http (alternate)
8080 (ТСР) http-alt
8888 (TCP) http (alternate)
Table 4:
ICMP Message Types to Allow Outbound at the Perimeter Router/Firewall
Message Types
Number Name
4 Source quench
8 echo request (ping)
12 parameter problem
ICMP Message Types to Allow Inbound at the Perimeter Router/Firewall
Table 5:
Message Types
Number Name
0 echo reply
3 destination unreachable
4 Source quench
11 time exceeded
12 parameter problem
UNCLASSIFIED
14
516 / 570
517 / 569
UNCLASSIFIED
This section describes methods using filters to defend the router, the firewall and the
protected network from information gathering and attacks. Note that one needs to be careful
with combining the below recommendations together in any filter in order to prevent
contradictions or other problems.
When creating a TCP/IP filter always delete any previous filter.
Set logging for each statement in the filter that blocks access. This feature will
provide valuable information about what types of packets are being denied and can
be used in intrusion detection against one's network. Refer to the following section
on Logging and Debugging for discussion of logging configuration in more detail.
Q Provide IP address spoof protection for the protected network. For inbound traffic do
not allow any IP packet that contains an IP address in the source IP address field
from the following: the protected network, any local host address (127.0.0.0 —
127.255.255.255), any reserved address (10.0.0.0 — 10.255.255.255, 172.16.0.0 -
172.31.255.255, 192.168.0.0 - 192.168.255.255) or any multicast address
(224.0.0.0 — 239.255.255.255). For outbound traffic allow IP traffic from the
protected network and do not allow IP traffic that contains an external IP address in
the source IP address field.
а Protect the router or the firewall from the Land Attack. This attack involves sending a
packet to the router with the same IP address in the source address and destination
address fields and with the same port number in the source port and destination port
fields. This attack can cause a denial of service.
а Protect the router or the firewall from the TCP SYN Attack. The TCP SYN Attack
involves transmitting a volume of connections that cannot be completed at the
destination. This attack causes the connection queues on the router or the firewall to
fill up, thereby denying service to legitimate TCP traffic.
о Protect the router, the firewall or the protected network from unnecessary ICMP
traffic. There are a variety of ICMP message types, and some are associated with
programs. Some message types are used for network management and are
automatically generated and interpreted by network devices. For example, the ping
program works with message type Echo. With Echo packets an attacker can create
a map of the protected networks behind the router or the firewall. Also, he can
perform a denial of service attack by flooding the router, the firewall or the hosts on
the protected network with Echo packets. With Redirect packets the attacker can
cause changes to a host’s routing tables.
For outbound ICMP traffic, one should allow the message types Echo, Parameter
Problem and Source Quench. Otherwise, block all other ICMP message types going
outbound. With Echo packets users will be able to ping external hosts. Parameter
Problem packets and Source Quench packets improve connections by informing
about problems with packet headers and by slowing down traffic when it is
necessary. For inbound ICMP traffic, one should allow the following message types:
Echo Reply, Destination Unreachable, Source Quench, Time Exceeded and
Parameter Problem. Otherwise, block all other ICMP message types coming
inbound.
а Protect the router, the firewall or the protected network from inbound traceroute.
Traceroute is a utility that prints the IP addresses of the routers that handle a packet
as the packet hops along the network from source to destination. On Unix operating
systems traceroute uses UDP packets and causes routers along the path to generate
ICMP message types Time Exceeded and Unreachable. Similar to ICMP Echo
UNCLASSIFIED 15
517 / 570
518 / 569
UNCLASSIFIED
packets, an attacker can use traceroute to create a map of the protected network
behind the router or the firewall.
а Apply a filter to the router or the firewall to allow only a small set of computers (e.g.,
those used by the administrators) Telnet access to the router or the firewall. Log all
successful and unsuccessful connections.
а ІҒап SNMP server is necessary on the router or the firewall, then apply a filter to the
router or the firewall to allow only a small set of computers (e.g., those used by the
administrators) SNMP access to the router or the firewall. Log all successful and
unsuccessful connections.
Example: Cisco 105 Routers
The following scenario steps through the recommendations listed above.
The following commands show an example of how to clear out a previous version of an
access-list before creating a new access-list.
Router (config)# no access-list 100
Router (config)# access-list 100 permit ip 10.2.9.0 0.0.0.255 any
Router (соп 19) # access-list 100 permit ip 10.55.1.0 0.0.0.255 any
The following commands show an example of how to set logging on an extended IP
access-list statement.
Router (config)# access-list 102 permit tcp 10.4.6.0 0.0.0.255 any eq 80
Router (config)# access-list 102 deny ip any any log
Note that there is an implicit deny statement at the end of every access list on a Cisco
router. This implicit statement blocks all other packets not permitted by the rest of the
access-list. However, it does not log these packets. Thus, add the following statements
at the end of each extended IP access-list. These statements will guarantee that the
router will log the values for the source and destination ports for TCP and UDP traffic
being denied.
Router (config)# access-list 106 deny udp any range 0 65535 any range 0
65535 log
Router (config)# access-list 106 deny tcp any range 0 65535 any range 0
65535 log
Router (соп 19) # access-list 106 deny ip any any log
Below are two example access-lists that provide IP address spoof protection. The first
example is for inbound traffic to the protected network (e.g., 14.211.150.0).
Router(config)# access-list 100 deny ір 14.211.150.0 0.0.0.255 any log
Router(config)# access-list 100 deny ip 127.0.0.0 0.255.255.255 any log
Router(config)# access-list 100 deny ір 10.0.0.0 0.255.255.255 any log
Router(config)# access-list 100 deny ip 172.16.0.0 0.15.255.255 any log
Router(config)# access-list 100 deny ip 192.168.0.0 0.0.255.255 any log
UNCLASSIFIED 16
518 / 570
UNCLASSIFIED
Router(config)# access-list 100 deny ip 224.0.0.0 15.255.255.255 any log
Router(config)# access-list 100 permit ip апу 14.211.150.0 0.0.0.255
Кошецсог а) # interface Ethernet1/2
Router(config-if}# description "external interface"
Router(config-if)}# ip address 25.73.1.250 255.255.255.248
Router(config-if}# ip access-group 100 in
The second example is for outbound traffic from the protected network (e.g.,
14.211.150.0).
Router(config)# access-list 102 permit ip 14.211.150.0 0.0.0.255 апу
Router(config)# access-list 102 deny ір any any log
Router(config)# interface Ethernet0/1
Router(config-if)£ description "internal interface"
Router(config-if)£ ip address 14.211.150.17 255.255.255.240
Router(config-if)}# ip access-group 102 in
Note that you can apply two access-lists to any interface on the router, one for network
traffic leaving the interface and the other for network traffic entering the interface.
m Тһе following commands show how to protect the router from the Land Attack.
Router(config)# access-list 101 deny ip host 198.26.171.178 host 198.26.171.178 log
Router(config)# access-list 101 permit ip any any
Router(config)# interface serial2/1
Router(config-if)£ description "external interface"
Router(config-if)}# ip address 198.26.171.178 255.255.255.248
Router(config-if)}# ip access-group 101 in
m Protect the router against the TCP SYN Attack for the following two scenarios: blocking
external access and limited external access. Below is an example for blocking external
access on a Cisco router. The access list blocks packets from any external network that
have only the SYN flag set. Thus, it allows traffic from TCP connections that were
established from the protected network (e.g., 14.2.6.0), and it denies anyone coming from
any external network from starting any TCP connection.
Router(config)# access-list 100 permit tcp any 14.2.6.0 0.0.0.255 established
Router(config)# access-list 100 deny ip any any log
Router(config)# interface serial0/0
Router(config-if}# description "external interface"
Router(config-if}# ip access-group 100 in
UNCLASSIFIED 17
519 / 569 519 / 570
520 / 569
UNCLASSIFIED
Below is an example for allowing limited external access on a Cisco router. Using the
TCP intercept feature, the access list blocks packets from unreachable hosts; thus, it only
allows reachable external hosts to initiate connections to a host on the protected network
(e.g., 14.2.6.0). |n intercept mode the router intercepts a TCP connection and
determines if a host is reachable. If successful, the router establishes the connection;
otherwise, it prevents the connection. This protection does not stop reachable hosts from
performing this attack against the router or the protected networks.
Router (config)# ip tcp intercept list 100
Router (config) # access-list 100 permit tcp any 14.2.6.0 0.0.0.255
Router (соп 19) # access-list 100 deny ip any any log
Router (config)# interface е0/0
Router (config-if)# description "external interface"
Router (config-if)# ip access-group 100 in
The following commands show how to allow outbound from the protected network (e.g.,
14.2.6.0) only the following ICMP message types: Echo, Parameter Problem and Source
Quench.
Router(config)# access-list 102 permit icmp 14.2.6.0 0.0.0.255 any echo
Router(config)# access-list 102 permit icmp 14.2.6.0 0.0.0.255 any parameter-
problem
Router(config)}# access-list 102 permit icmp 14.2.6.0 0.0.0.255 any source-
quench
Router(config)# access-list 102 deny icmp any any log
The following commands show how to allow inbound to the protected network (e.g.,
14.2.6.0) only the following ICMP message types: Echo Reply, Destination Unreachable,
Source Quench, Time Exceeded and Parameter Problem.
Router(config)# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 echo-reply
Router(configf£ access-list 100 permit icmp апу 14.2.6.0 0.0.0.255
unreachable
Router(config)}# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 source-
quench
Router(config)# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 time-
exceeded
Router(config)# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 parameter-
problem
Router(config)# access-list 100 deny icmp any any log
The following command shows how to block inbound traceroute from a Unix computer.
Router (config)# access-list 111 deny udp any any range 33434 33534 log
UNCLASSIFIED 18
520 / 570
521 / 569
UNCLASSIFIED
m Тһе following commands show how to allow Telnet access from certain computers on the
protected network (e.g., 14.4.4.0) to the router via an extended IP access-list. The
administrator can telnet to any interface IP address on the router. However, the router
converts any interface IP address to 0.0.0.0. Thus, the unusual destination IP address
0.0.0.0 must be used in the access-list.
Router(config)# access-list 105 permit tcp host 14.4.4.10 host 0.0.0.0 eq 23 log
Router(config)# access-list 105 permit tcp host 14.4.4.11 host 0.0.0.0 eq 23 log
Router(config)# access-list 105 permit tcp host 14.4.4.12 host 0.0.0.0 eq 23 log
Router(config)# access-list 105 deny ip any any log
Router(config) line vty 04
Router(config-line)# access-class 105 in
m Тһе following commands show how to allow SNMP access from certain computers on the
protected network (e.g., 14.4.4.0) to the router via a standard IP access-list.
Router(config)# access-list 10 permit 140.4.4.10
Router(config)# access-list 10 permit 140.4.4.11
Router(config)# access-list 10 permit 140.4.4.12
Router(config)# snmp-server community snmp72str1ng64 ro 10
Logging and Debugging
Logging on a router or a firewall offers several benefits. It informs the administrator if the
router or the firewall is working properly or has been compromised. It can also show what
types of attacks are being attempted against the router, the firewall or the protected network.
The following are recommendations for logging and debugging:
а
а
Send Ше most serious level of logs to the console on the router or the firewall in
order to alert the administrator.
Send the logs to a log host, which should be a dedicated computer on the protected
network whose only job is to receive logs. The log host should have all unnecessary
servers and accounts disabled except for syslog.
Configure the router or the firewall to include more specific time information in the
logging and in the debugging. Direct the router or the firewall to at least two different,
reliable network time protocol (NTP) servers to ensure accuracy and availability of
time information. Set all NTP messages with the same IP source address of an
interface on the internal network. This configuration will allow the administrator to
create a TCP/IP filter that allows time information only from the internal IP address of
the router or the firewall to the external NTP servers. This filter will help to prevent
spoofing or flooding NTP messages to the router or the firewall. Include a more
specific timestamp in each log message and each debug message. This will allow an
administrator to trace network attacks more credibly.
UNCLASSIFIED 19
521 / 570
522 / 569
UNCLASSIFIED
о By default, a log message contains the IP address of the interface it uses to leave the
router or the firewall. Instead, set all log messages with the same IP source address
of an interface on the internal network, regardless of which interface the messages
use. This configuration will allow the administrator to create a TCP/IP filter that
allows logs only from the internal IP address of the router or the firewall to the logging
host. This filter will help to prevent spoofing or flooding log messages to the logging
host.
а Finally, consider also sending the logs to a dedicated printer to deal with worst-case
scenarios, e.g., failure of the log host.
Example: Cisco IOS Routers
The following scenario steps through the recommendations listed above.
Enable the router's logging capability with the following command.
Router (config) # logging on
Set the syslog level to be sent to the router console. The following command is ап
example.
Router (config) # logging console informational
Note that the effect of the log keyword with the IP extended access-list statements
depends on the setting of the logging console command. The 1og keyword takes effect
only if the logging console syslog level is set to 6 (informational) ОГ 7 (debugging). If
the level is changed to a value less than 6 and if the 16g keyword is used within an IP
extended access-list command, then no information is logged to the log host or displayed
to the console. Refer to the previous section on TCP/IP Filters for discussion of access-
lists in more detail. Finally, disable logging to all terminal lines except for the router
console with the following command.
Router(config)# no logging monitor
Set the IP address of the log host. Set the syslog level to be sent to the log host. Set
the syslog facility type in which log messages are sent. The following commands are
examples.
Router (config) # logging 10.1.1.200
Router (config) # logging trap debugging
Router (config) # logging facility local?
The following commands show an example of how to зе time information for the logging
and for the debugging.
Router (config)# пір server 192.168.41.40
Router (config)# пер server 192.168.41.41
Router (config)# ntp source Ethernet0/1
UNCLASSIFIED 20
522/570
UNCLASSIFIED
Router (config)# service timestamps log datetime localtime show-timezone
Router (config)# service timestamps debug datetime localtime show-timezone
Router (config) # clock timezone EST -5
Router (config) # clock summer-time EDT recurring
m Тһе following command shows an example of how to set all log messages with the same
IP source address of a router interface.
Router (config) # logging source-interface е0/1
General Recommendations
It is highly recommended that the configuration files for the router or the firewall be created,
stored and maintained on a computer offline in ASCII format. These files will contain any
comments that can help give perspective to the configuration settings and the filters. Also,
changes to the filters can be done with much more ease and accuracy. Then the file can be
transferred from the computer to the router or the firewall. This is invaluable for diagnosing
suspected attacks and recovering from them. Finally, protect the contents of the
configuration files from unauthorized individuals.
UNCLASSIFIED 21
523 / 569 523 / 570
524 / 569
UNCLASSIFIED
Windows NT 4.0 and Windows 2000
Service Packs And Hotfixes
A service pack is a periodic update to the operating system that contains fixes to
vulnerabilities and bugs. To date, Microsoft has released six service packs for Windows NT
4.0 and two service packs for Windows 2000. Updates addressing specific vulnerabilities and
bugs introduced between Service Packs are called hotfixes. Service packs are cumulative,
meaning they include all hotfixes from previous service packs, as well as new fixes.
In addition to installing the latest service packs, it is important to install new hotfixes, as these
patches will often address current attacks that are proliferating throughout networks. Although
Microsoft recommends applying a hotfix only if a system experiences the specific problem, it
is recommended that all security-related hotfixes be installed immediately after installation of
the latest service pack. If a service pack is reapplied at any time, the hotfixes must also be
re-installed.
Checking System Patch Status
A major challenge for network administrators is keeping up to date on the latest patches.
Microsoft now provides a Network Security Hotfix Checker (Hfnetchk.exe) tool that lets
administrators scan their servers -- including remote ones -- to ensure that that they are up to
date on all security patches for Windows NT 4.0, Windows 2000, IIS 4.0, IIS 5.0, IE and SQL
Server. Detailed information on Hfnetchk, including download location, is available in
Knowledge Base article Q303215 at
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/hfnetchk.asp.
Windows NT 4.0 Patches
To achieve the highest level of Windows NT security, install Service Pack 6a and the post
Service Pack 6a hotfixes. For a complete list of available service packs and hotfixes go to
http://Awww.microsoft.com/ntserver/nts/downloads/recommended/SP6/.
Microsoft has provided the Security Rollup Package (SRP) as a mechanism for managing the
rollout of security related fixes. The SRP includes the functionality from many security
patches released for Windows NT 4.0 since the release of Service Pack 6a. The SRP
includes post-Service Pack 6a fixes that were delivered via Microsoft security bulletins as well
as a small number of fixes that were not addressed through this forum. For a complete listing
of all fixes in the SRP, refer to Microsoft Knowledge Base Article (Q299444), “Post-Windows
NT 4.0 Service Pack 6a Security Rollup Package (SRP),” at
http://support.microsoft.com/support/kb/articles/q299/4/44.asp.
Fixes not included in the SRP:
Fixes for newer vulnerabilities may not be included in the SRP. These must be applied
separately and may be downloaded from
http://www.microsoft.com/ntserver/nts/downloads/recommended/SPG6/. Іп addition, the
following vulnerability affecting Windows NT 4.0 systems is not included in the SRP.
UNCLASSIFIED 22
524 / 570
525 / 569
UNCLASSIFIED
Enhanced Security Level Hotfix - When changing the domain password with the C2
security registry entry enabled a "Stop Ox1E" error message may occur. The problem occurs
if the administrator has Service Pack 6a (SP6a) installed and the following registry entry is
set:
Hive: HKEY LOCAL MACHINE
Key: SYSTEM\CurrentControlSet\Control\Session Manager
Value: | EnhancedSecurityLevel
Туре: REG DWORD
Data: 1
This key ensures that Object Manager can change the attributes of a kernel object in the
Object table for the current process if the previous mode of the caller is kernel mode. When
attempting to change the password after setting this registry value, the following error
message will be received: Stop 0x0000001e (0xc0000005, 0x8019bb12, 0x00000000,
0x0000022c)
A supported fix that corrects this problem is now available from Microsoft, but it is not
available for public download. To resolve this problem immediately, contact Microsoft Product
Support Services to obtain the fix. This hotfix is also available from NSA. For a complete list
of Microsoft Product Support Services phone numbers and information on support costs,
please go to the following address on the World Wide Web:
http://support.microsoft.com/directory/overview.asp
Windows 2000 Patches
To achieve the highest level of Windows 2000 security, install Service Pack 2and the post
Service Pack 2 hotfixes. For a complete list of available service packs and hotfixes, refer to
http://www. microsoft.com/windows2000/downloads/default.asp
List Of NT/Windows 2000 Security Measures
This list of NT/Windows 2000 security measures is by no means exhaustive. There are
approximately 400 known vulnerabilities with Windows NT/2000 and associated applications.
This list addresses less than 10 percent of those vulnerabilities. It should also be understood
that alleviating one's network of these vulnerabilities does not render the network "secure".
Q Ensure that the file system is NTFS versus FAT. NTFS allows file access control to
be set; FAT does not.
Q Limit the information available from a null connection. Null connections (anonymous
users) are included in the built-in Everyone security group; thus, anonymous users
have access to any resources that the Everyone group has access to. Windows NT
Service Pack 6a limits much of what an anonymous user can do. Prevent
anonymous users from being able to enumerate account names and shares by
setting the following registry key:
Hive: HKEY LOCAL MACHINE
Key: System\CurrentControlSet\Control\Lsa
Name: RestrictAnonymous
Type: REG_DWORD
Value: 1
а Remove the Everyone group from the “Access this Computer from the Network" user
right. Replace it with the Authenticated Users group. In Windows NT 4.0, this can be
UNCLASSIFIED 23
525 / 570
526 / 569
UNCLASSIFIED
accomplished under User Manager -» Policies -> User Rights. In Windows 2000, this
can be done via the Security Configuration Toolset and Group Policy.
Do not allow remote registry access. There are many registry keys that allow the
Everyone group, and therefore anonymous users, read and/or set value permissions.
If an unauthorized user was able to remotely edit the registry, he could modify
registry keys in an attempt to gain elevated privileges. Restricting remote registry
access is accomplished Бу setting security permissions оп the
HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg key. It is
highly recommended that only Administrators and System have remote access to the
registry.
Ensure that the Guest Account is disabled. Ensure that all accounts (service and
user) have passwords regardless if the account is enabled or disabled.
Disable LanMan authentication. LanMan passwords are used for backwards
compatibility with older Windows operating systems (e.g., Windows 9x) and are
simply the NT/2000 password converted to all uppercase and encrypted in a different
way. LanMan passwords are easier to crack than NTLM hash because they are
treated as two 7-character passwords. It is recommended that LanMan passwords
be disabled. If Windows 9x boxes reside on the network, Directory Client Services
(available on the Windows 2000 CD) must be installed on these systems in order to
allow NTLM version 2 authentications. To disable LanMan authentication, set the
following registry key:
Hive: HKEY_LOCAL_MACHINE
Key: System\CurrentControlSet\Control\Lsa
Name: LMCompatibilityLevel
Type: REG DWORD
Value: 5
Close ports 135, 137, 138, and 139 either at the premise router or firewall. For
networks containing Windows 2000 systems, also block port 445. These ports are
needed in an internal network, but not externally. Blocking these ports will stop many
attacks against Windows NT and Windows 2000. Also, remove unneeded protocols
(e.g. NetBeui, IPX).
Out-of-the-box permissions on Windows NT system files and registry keys are overly
permissive. Replace the Everyone group with the Authenticated Users group on
critical system folders and files (e.g. WINNT, system32) and registry keys (e.g.,
HKLM\Software\Microsoft\Windows\Run and HKLM\Software\Microsoft\Windows
NT\CurrentVersion\AEDebug).
Restrict permissions on network shares. When a share is created, the default access
control is Everyone having Full Control. Restrict the share permissions to only those
groups that need access.
Remove all services that are not required (e.g., Telnet, FTP, Web). Ensure proper
placement of services on the network (e.g. RAS or Web service should not be on a
Domain Controller).
Enable auditing. At a minimum, audit logons and logoffs, failed attempts at exercising
user privileges, and system events such as shutdowns.
Review Trust Relationships between domains. Remove unnecessary trusts.
UNCLASSIFIED 24
526 / 570
527 / 569
UNCLASSIFIED
Microsoft Applications
Vulnerabilities in applications such as Outlook, Microsoft Exchange, SQL Server, and ІІБ may
open a network to attack. Therefore, it is important that applications be kept current with the
latest patches and service packs. Microsoft provides several tools for improving application
security. Some of these tools are listed below, along with a web reference to follow for more
information.
URL Scan Security Tool — Allows web server administrators to restrict servers to ensure
that they only respond to legitimate requests.
http://www.microsoft.com/technet/security/URLScan.asp
IIS Lockdown Tool - A Microsoft tool for securing IIS 4.0 or 5.0 web server.
http://www. microsoft.com/technet/security/tools/locktool.asp
Improved Outlook E-mail Security Update - A new version of the Outlook E-mail Security
Update is available that provides protection against additional types of e-mail-based attacks.
http://office.microsoft.com/downloads/2000/Out2ksec.aspx
HFNetChk Security Tool — In addition to operating system patches, checks security patches
for IIS 4.0, IIS 5.0, IE, and SQL Server.
http://www.microsoft.com/technet/security/tools/hfnetchk.asp
Microsoft Personal Security Advisor - A Microsoft tool for checking that workstations are
current with all security patches апа configured for secure operation.
http://www. microsoft.com/technet/security/tools/mpsa.asp
UNIX Networks
The following recommendations can be taken to secure UNIX networks.
Startup Scripts
Check the permissions and ownership of files. If they allow world access, browse scripts to
see if any unusual process or script is started, especially if in user directories. Files and
directories should be owned by root/root or root/sys with limited or no world write or execute
permissions so that they cannot be modified or exploited by unauthorized users. User startup
files should be owned by the individual user and have permissions of 640. In each user's
directory, check for hidden files (e.g.,. login, .profile, etc...) that have extensions, such
as .old/. backup or begin with "..", "...".
Services/Ports
Run a port scanner, such as nmap (available at http://www.insecure.org/nmap) to list open
ports and services. Many UNIX services have well known security vulnerabilities associated
with them, which allow root access. All unnecessary services (e.g., rexd, rquotad, talk,
sadmind, kcmsd, rstatd, fs, exec, daytime, walld, fingerd, systat, rusersd, sprayd, uucpd,
UNCLASSIFIED 25
527 / 570
528 / 569
UNCLASSIFIED
chargen, time, echo, display, tftp, comsat and discard) should be disabled by placing a # at
the beginning of the lines in the /etc/rc* files or in the /etc/inetd. conf file that caused
the program to be executed. In addition, these ports should be blocked at the perimeter
router or firewall.
System Trust
There are various ways for UNIX systems to allow access to a machine or an account without
providing a password. Through the use of .rhosts ,.forward, .netrc, hosts.lpd,
and hosts.equiv files, it is possible for a user on one system to access another system
without providing a password. This practice should be reviewed for necessity. An intruder
breaking into an authorized user's account can use those same trusts to reach multiple
machines with little effort. Do not use plus signs (*) in these files as they allow wider access
(to users and/or machines) than might be intended. Prohibit root from logging directly into a
remote system through either the /etc/ttys, /etc/ttytab, ог /dev/default/login
files.
R Commands
Telnet and the "r commands" (rlogin, rcp, rsh and rexec) may transmit the username and
password in the clear making it easy for an attacker with a sniffer to capture this information
and act as a trusted user. If trust relationships are set up, "r" commands enable someone to
access a remote system without supplying a password. If an attacker gains control of any
machine in a trusted network, then he or she can gain access to all other machines that trust
the hacked machine. If these services are not required, they should be disabled; otherwise,
install openssh (available at http://www.openssh.com/). In addition, ssh, which includes sftp,
is an alternative solution to FTP. The service encrypts all traffic including the password to
reduce the threat of eavesdropping. Do not allow trust relationships.
Network Configurations
Patches
Check to see if network configuration files (such as hosts, defaultdomain,
defaultrouter, netmasks, etc.) are owned by root/root and have permissions of 644.
This is suggested to alleviate unauthorized modifications.
Ensure applicable system and security patches are current and have been installed. Note
that patches may not be applied until a reboot occurs. Therefore, if a patch is listed in the
output from "Patchdiag", "showrev", or whatever specific patch checker tool or UNIX
command is used, but the machine has not been rebooted in awhile, there is a possibility that
the machine may still be vulnerable.
User Accounts
Review all user accounts. Do they all have unique UIDs? This is important to enforce so that
a person will not obtain the privileges associated with someone else's account or be able to
read, delete, or modify another person's files. Check to make sure each shell field is set to a
valid shell to alleviate malicious code from being executed and granting root access. The
nobody4 account is for SunOS backward capability and should be deleted, if not needed.
Make sure every line in the /etc/passwd file is in the proper format to alleviate accidental
logins by an unauthorized person. Permissions for most home directories should be 740. Ftp
and uucp users may be exceptions. Check automount directories for unauthorized
UNCLASSIFIED 26
528 / 570
529 / 569
UNCLASSIFIED
automount maps. All maps should be protected with permissions 755 and owned by
root/root.
System administrators should not directly log in as root, but rather as themselves and then
switch user (su) to root. This is important for accountability. An administrative group (e.g.
wheel) should be created in the /etc/group file and each administrative user should belong
to that group. Once the administrative group has been created, the "su" program should have
its ownership, group, and permissions changed (root/wheel, 750).
Permissions
Look for 'setuid' or 'setgid' files and programs. Drop the 'suid' and/or 'sgid' bits, if not needed.
Look for world writable directories and files and drop the world permissions, if not needed.
This will help prevent unauthorized access or the insertion of malicious code. Also check for
files owned by root and are mode world read/write. These files may indicate a potential
symbolic link attack if one of the parent directories are writable by the attacker. Check umask
values. Suggest that user umasks be set to 022.
Cron/At Jobs
Check permissions on cron and at job .a11ow and .deny files. They should be 644,
root/sys. .a11ow files permit users to use crontab and atjobs. .deny restricts these users
from access. If .allow files do not exist, then the system checks the .deny files. If neither file
exists, depending on system configurations, it either allows just root or everyone to write
cron/at jobs. Check to make sure that all cron and at jobs have valid users associated with
them. Crontab and atjob files should be owned by the specific user associated with them and
have permissions of 600. Make sure that all cron or at jobs use absolute paths (full path
names).
Core Dumps
Check for core files. Most reside in the "/" directory, but others may be located elsewhere.
Core files may contain sensitive system data or user passwords. Remove core files from the
system. Configure the system so that when core files are created, they are automatically
redirected to /dev/nu11 or have a ulimit=0.
Network Services
NIS
Ensure NIS maps do not contain system accounts. Establish a securenets file in the NIS
environment as an effective way to secure access. Look for strange entries within the NIS
ypserv.log file. This is suggested to prohibit unauthorized access.
NIS *
Check to see if NIS + is running іп yp compatibility mode. If the "-YP" argument is there, the
server is in NIS emulation mode and all exploits for NIS apply. Delete nobody permissions
so that unauthorized persons don't have access to the NIS+ tables. Make sure world is given
read-only permissions, except for the password table, which shouldn't allow any world
access. When checking table permissions and access rights, they should match. Individual
users should only have read access to the password table to prevent users from changing
their UID value to 0, which would give them root access.
UNCLASSIFIED 27
529 / 570
UNCLASSIFIED
NFS
Ensure the NFS environment is not exporting sensitive file systems to the world (i.e., /etc,...)
regardless of permission settings. Ensure no critical file systems are shared to the world with
read-write access. Ensure exported file systems are directed to specific hosts via the
/etc/dfs/dfstab file or via netgroups. Ensure files аге not exported to "localhost". Ensure files
are shared with the "nosuid" designator, unless suid is required. Ensure the anonymous user
has been established correctly. If the system has anon=0, then "root" users of remote
machines will have the UID specified after the "=" equal sign. If the "root=" user has been
established, then root users of the machines specified after the "=" equal sign will have a UID
of zero on the remotely mounted file systems. Check all clients and servers to see which file
systems are being mounted locally or remotely.
DNS
The Domain Name Service is the mechanism that Internet hosts use to determine the IP
address that corresponds to a given hostname. Attackers often attempt zone transfers in
order to gather information about a local network. One way to prevent zone transfers is to
block tcp port 53. This can be done via firewall or or router access filters. Disable the BIND
name daemon (named) on systems not authorized to be DNS servers. On the servers,
upgrade to the latest version of BIND and run it as a non-privileged user. Run DNS in a
chrooted environment. Hide the version string via the version option in named.conf.
Sendmail
Upgrade to the latest version of Sendmail. Do not run Sendmail in daemon mode (turn off the
-bd option) on machines that are not mail servers or relays. Do not display the version
number through sendmail banners. Ensure that the decode alias is not available. Decode
should be removed or commented out of the /etc/aliases file so that it does not pipe to
the 'uudecode' command and allow an attacker to overwrite system files. Check for
. forward files as they can open up the system to attacks. If not needed, remove them or
link to /dev/null. If needed, permissions should be 740 and owned by the user. If the
system is not a server or does not have to listen for incoming mail, rename the sendmail
startup script, binaries, and configuration files and change their permissions to 000.
System logging is crucial for troubleshooting and tracking unauthorized user accesses.
Ideally, logs should be kept locally AND sent to a central loghost that does nothing but accept
and store log messages. Your network security policy should help dictate which events need
to be audited. Logcheck and swatch are tools that system administrators can use to examine
log files for unusual activity, based on key phrases or specially set string patterns. They can
also send emails to the system administrators, alerting them to possible unauthorized activity.
Both are open source tools.
X-Window Environments
Remove the X Windowing environment on the server. By removing the Common Desktop
Environment (CDE) and/or SUN's OPENWINDOW environment, the network server will not
be susceptible to a variety of vulnerabilities.
Distributed Server Functions
It is commonly considered a good security practice to distribute the server functions of a
network among separate systems. For instance, the DNS server should be separate from the
mail server, which should be separate from the firewall, etc. A number of products, such as
UNCLASSIFIED 28
530 / 569 530 / 570
UNCLASSIFIED
Borderware's firewall product, include the software to run a web server, mail server, DNS
server and other server functions all from the firewall. However, this presents a single point
of failure for the network and therefore an avoidable vulnerability. Ideally, network servers
should be set apart from the user segment in a secure DMZ or secure server network. Most
firewalls allow this and if it does not, it can easily be accomplished by using routers behind
the firewall.
Chroot Environments
chroot() is a UNIX command used to run a command or interactive shell with a special root
directory. This command can also be used to create a "virtual" operating system and
directory tree. It would be inside of the new "virtual" directory tree that DNS, Sendmail, Web,
and other various servers could run. This would provide a potentially safe location for the
applications. Building a chroot()ed environment can be very useful in protecting the rest of the
system and keeping hackers out, however, it is easy to make a mistake while creating this
chroot()ed environment. If it is improperly installed, it could create more ways for the hacker
to infiltrate the machine.
Interesting Files
Check for files that have no permissions or have invalid owners or groups. Sometimes
admins will have specific files which have no permissions assigned to them. These files can
be kicked off by a script, cronjob, or app that temporarily changes the permissions during the
execution of the program, then resets the program back to the original state.
Peripheral Devices
Consider removing or restricting access to local or network peripheral devices. Malicious
code is easily introduced into secure networks via their peripheral devices. If an external
device is not required for a specific client or server, have it removed. If the device cannot be
removed, disable access to it via the hardware or software. Check to see if local and network
printers are secure. Floppies should not be introduced to a client or server without the prior
consent of the local Network Security Officer representative.
Buffer Overflows
Ensure that SOLARIS systems have a non-executable stack environment enabled. This will
help prevent buffer overflows that originate from within the memory stack. For buffer
overflows in RPC services, block the RPC port 111 at the router or firewall.
System Utilities and Commands
Restrict access or remove system utilities such as compilers, debuggers, etc. These utilities
aid an adversary in informational reconnaissance. System commands like "strings" and "In"
should either have their permission bits restricted or have them removed form the system.
Current OS Packages
Ensure that the system packages are current. Solaris 7 and 8 can check the integrity and
accuracy of system packages. Sometimes malicious code can be introduced to a system as a
system package.
UNCLASSIFIED 29
531 / 569 531/570
532 / 569
UNCLASSIFIED
There are several scripts that can be implemented on a UNIX system that will search for
rootkits on clients and servers. Checking the integrity of system files against a master backup
known not to be altered by malicious code is also a good practice.
Security Tools
To ensure and maintain the integrity of the network servers, it is important to constantly
monitor them for signs of malicious activity. There are a number of tools that can aid an
administrator in this task. Two of these tools that are commonly implemented are Tripwire
and TCPD.
Tripwire
Tripwire monitors the permissions and checksums of important system files to easily detect
files that have been replaced, corrupted, or tampered. For example, if an intruder gains
access to the server and replaces the /bin//Is command with one that performs unwanted
functions, tripwire will send an alert. Tripwire will send the system administrator a report each
night. Tripwire calculates the checksums of executable files from a clean install. It then
recalculates these checksums and compares them on a regular basis. Since some hackers
are skilled enough to spoof the checksums on modified files, tripwire uses two different
checksum methods. It is important to save the original checksums оп a non-rewriteable CD
on the system. This ensures data integrity.
TCPD
TCPD, also referred to as "TCP wrappers," allows one to log connections to TCP services
such as telnet, rlogin and finger. |n addition, it allows one to restrict which systems can
connect to these services via two files, hosts.allow and hosts.deny. Both of these features
can be very useful when tracking or controlling unwanted guests on a network. TCPD is easy
to install and does not require modification to existing network programs. Just modify tne
/etc/inetd.conf file to execute TCPD instead of the actual program. TCPD will then do
any necessary logging and security checks before running the real daemon.
For example, if the /etc/inetd. conf originally contained this line:
telnet stream tcp nowait root /etc/in.telnetd in.telnetd
Change it to this:
telnet stream tcp nowait root /usr/etc/tcpd in.telnetd
UNCLASSIFIED 30
532 / 570
533 / 569
UNCLASSIFIED
UNIX Web Servers
This section describes security configuration for UNIX web servers, using Apache as the
example. It is assumed that Apache has been installed from the distribution and that none of
the security parameters has been modified that come default in the original setup.
General Guidance
а Ensure that the computer that runs the web server is dedicated. It should not have
other uses, e.g., being a client workstation or print server. Always upgrade to the
latest version of the web server available that is not the beta version.
Do not perform development work on the operational web server. All data should be
in final form and simply copied into place. Create a secondary mirror of the server for
all development services and experimentation. Transfer data to the web server by
tape, disk, or CD. Do not use FTP or telnet for data transfer.
Remove all unnecessary services on the web server, including FTP, telnet, and X
Windows. |f that is not an option, make sure to run tcpwrappers on the open
services. Use a port scanner to check for open ports on both the TCP and UDP
protocols. If possible, use command line interfaces instead of X Windows. Using an
X windowed interface opens up ports that cannot be effectively closed and still have
the system remain functional. Since the server should be in production mode only,
only a command line is required to update the site. Testing of the site should be
done from a separate client.
Isolate the web server physically and virtually. If possible allow local access to the
web server to the fewest number of people with a minimal number of users. Keep
the web server close to the administrator, the web engineer, or the webmaster. Keep
the web server on a LAN segment separate from the rest of the IT infrastructure. Do
not mount or share services to and from the server.
Example: Apache
As of 26 September 2001, Apache 1.3.20 is the latest version and is available at
http://httpd.apache.org
а Ensure the user running the Apache web server is set to nobody. In the httpd.conf
file in the /usr/local/apache/conf directory, make sure that the effective user is
nobody and that the group option is also set to nobody. Below are the lines to add to
the file.
User nobody
Group nobody
Ensure that user nobody does not own or have write access to the htdocs or cgi-bin
subdirectories or any other subdirectory under these. Below are the commands to
set ownership of these directories to root and to restrict write access to only root.
chown -R root /usr/local/apache/htdocs
UNCLASSIFIED 31
533 / 570
UNCLASSIFIED
chown -R root /usr/local/apache/cgi-bin
chmod 755 /usr/local/apache/htdocs
chmod 755 /usr/local/apache/cgi-bin
Do not store cgi-bin related data in a directory accessible to the web server. For
example, create another directory called cgi-data in /usr/local/apache alongside cgi-
bin and htdocs. Have the cgi scripts use that directory for data storage and
manipulation.
Turn off Autolndexing and Follow Symbolic Links. By default, Apache usually comes
with automatic indexing of directories enabled. Look in the httpd.conf file (usually in
the /usr/local/apache/conf directory) for the following line.
«Directory "/usr/local/apache/htdocs">
Within those set of options you will see an Options line that may look like the
following.
Options Indexes FollowSymLinks Multiviews
This configuration means any requests for a directory that do not find an index file will
build an index of what is in the directory. Also, any symbolic link in the document
directory will also be followed even if it is outside of the web server's purview. For
example, a symbolic link may be made to the root directory, giving at least read
access to a great deal of the system as the owner of the web server process.
For the most secure/functional Directory options, this segment of the httpd.conf file
should look like the following.
«Directory "/usr/local/apache/htdocs">
Options Multiviews
AllowOverride None
Order allow,deny
Allow from all
</Directory>
Refer to the following URLs for further guidance:
534 / 569
http://httpd.apache.org/docs/misc/security tips.html
http://www.linuxplanet.com/linuxplanet/tutorials/1527/1/
http://www.modperl.com/perl conference/apache security/
http://www. bignosebird.com/apache/a11.shtml
UNCLASSIFIED 32
534 / 570
535 / 569
UNCLASSIFIED
Intrusion Detection Systems (IDS)
This section of the 60 Minute Network Security Guide departs from the explicit detail of
previous sections and provides a brief overview of Intrusion Detection Systems, describing in
general terms the steps to be taken when deploying IDS in your environment.
Generally, there are two types of IDS: host based and network based. Host based IDS
monitor security within a network component, such as a server or a workstation. Network
based ID systems monitor the traffic between network components and networks. Some IDS
are strictly network based, whereas others are a combination of network and host based.
Most IDS are comprised of two components, sensors and managers. Depending on the IDS
type, sensors can be either network based or host based.
The following are steps to be taken when deploying an IDS.
Step 1 - Identify what needs to be protected
To maximize the utilization of IDS, the organization must first determine in order of priority
what needs to be protected. For many organizations, the various servers, i.e., application,
database, file and domain controllers, contain mission critical resources. Furthermore,
depending on the organization, some departments may be more critical than others or must
enforce different trust relationships. All of this must be defined in a priority list prior to
deploying any IDS.
Step 2 - Determine what types of sensors are required
The types of sensors that are required are dependant on the priority list defined in Step 1. A
host sensor would be used to monitor a critical server, whereas a network sensor would be
used to monitor network entry points and critical network segments.
Another important issue to consider is how many sensors the organization can afford to buy.
This number will influence how the sensors are deployed throughout the network, as the
number of critical resources must be balanced against how many sensors can be acquired
and maintained.
Step 3 - Configure host system securely
Prior to loading any IDS, the host that the IDS will reside on must be configured securely.
Often, the vendor of the IDS will supply its own host to run the IDS sensor, in which case, the
vendor should supply guidelines on how to secure that host. Otherwise, the IDS typically
reside on Unix and Microsoft Windows NT/2000 hosts. The guidelines for securing Unix and
Microsoft Windows NT/2000 systems are well documented elsewhere in this document.
Step 4 - Keep signature database current
The majority of IDS that are currently available for use are signature based. Because new
vulnerabilities and attacks are being discovered daily, the signature database must be kept
current. The respective vendors should supply the latest signatures for their IDS.
Step 5 - Deploy IDS sensors
The final phase is to actually deploy the IDS. The following scenarios are based on how
many sensors are available for deployment versus what is deemed critical.
UNCLASSIFIED 33
535 / 570
536 / 569
UNCLASSIFIED
Scenario 1
If the organization can only afford to purchase and monitor one sensor of any type, then it
should be a network sensor. As described earlier, a network sensor is much better suited to
monitoring large segments of a network, whereas a host sensor is limited to monitoring the
system that it resides on. In this scenario, the ideal location to place the sole network sensor
is in the DMZ, between the external router and the firewall, as shown in Figure 1. In spite of
having only one sensor, this design allows the IDS to be used for maximum effectiveness. By
placing the IDS sensor between the external router and the firewall, the sensor can monitor
all network traffic going to and coming from the Internet.
Furthermore, because the router can filter all incoming traffic from the Internet, the IDS
sensor can be tuned to ignore certain types of attacks, thereby allowing the sensor to operate
with maximum efficiency.
~r
RC
Internet
Web Network based
Server ID sensor
Figure 1 - Deploying 1 ID system
Scenario 2
In the case where only two sensors of any type can be acquired and maintained, then they
should be network sensors. Like the previous scenario, one of the sensors should be placed
in the DMZ, between the external router and the firewall. The second sensor should then be
placed between firewall and the intranet, as shown in Figure 2. The second sensor can
indicate what attack breached the firewall. By strategic placement of these two sensors, all
access points from the Internet will be monitored.
UNCLASSIFIED 34
536 / 570
537 / 569
UNCLASSIFIED
Network based
ID sensor
м”
ме” ^ч.
Internet
ol
sy E
Web Network based
Server ID sensor
Figure 2 - Deploying 2 ID systems
Scenario 3
If more than two sensors of any type can be acquired and maintained, then at least two
should be network sensors. Those sensors should be deployed as described in Scenario 2. If
a critical LAN within the intranet needs to be protected, then a network sensor should be
placed at the entry point to that LAN. The remaining sensors should be host sensors that are
loaded onto critical servers, such as domain controllers, file servers, web servers, and mail
servers. The order of what is deemed critical is determined by the organization, as directed in
Step 1.
Step 6 - Management and Configuration
The other component of IDS, the manager, should be centrally located where dedicated
security staff can monitor the health of the systems and network. Many organizations have a
Network Operations Centers (NOC) that fulfills the role of a central location to place the
manager. IDS sensors could then report all alerts to the NOC, thereby allowing the security
staff to respond quickly to attacks and to notify the appropriate authorities, such as CERT
technicians.
The other issue to consider is how to configure the sensors. Careful configuration of the
sensors can increase the effectiveness of IDS and all unnecessary signatures should be
disabled. For example, if the network is entirely composed of Microsoft Windows NT systems,
then the sensors can be configured to ignore any attacks that are directed against Unix
systems. Therefore, if the organization has a priority list as defined in Step 1, as well as
knowing the network intimately, it can benefit greatly from having a properly configured IDS.
UNCLASSIFIED 35
537 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
538 / 569 538 / 570
(Swedish) "Men làs sjálv 4а fór fan." / Gustav Norstróm.
(English) " Read this PDF text damn yourself, and then come back. *
or "Fuck you, then read it yourself."
" If you read something, and cant separera truth from fiction, when
you read it, something important is missing уои. " / Gustav Norström.
————99
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
555 / 569 555 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
540 / 569 540 / 570
Report Criticizes C.I.A.'s Initial Handling of Havana Syndrome Cases... https://www.nytimes.com/2022/10/14/us/politics/cia-havana-syndrom...
Ebe New York Cimes https://www.nytimes.com/2022/ 10/ 14/us/politics/cia-havana-
syndrome-report.html
Report Criticizes C.I.A.s Initial Handling of Havana
Syndrome Cases
Ап inspector general report sent to Congress this week finds fault with the intelligence
agency's Office of Medical Services.
3 By Julian E. Barnes
<
Oct. 14, 2022
WASHINGTON — The C.I.A. sent an inspector general report that was critical of how
the agency handled early reports of injuries that came to be known as Havana
syndrome to Congress this week, according to current and former officials.
The report, said people briefed on the findings, criticized how the Central Intelligence
Agency's top physicians in the Office of Medical Services dealt with the unexplained
incidents during the Trump administration, when some C.I.A. officials were doubtful
about Havana syndrome-related illnesses. As a result, many people with symptoms
found it difficult to get prompt medical care.
Diplomats and C.I.A. officers began reporting ailments arising from strange incidents
beginning in 2016 in Havana. Since then, government employees and family members
in China, Austria, Serbia and other locations around the world have also reported
symptoms.
The report comes as the agency has begun making payments to some victims of what
the government calls anomalous health incidents. Those victims have been frustrated
with intelligence conclusions that the injuries were not the result of a worldwide
campaign by a hostile country, such as Russia.
C.I.A. officials declined to discuss details of the report, but a spokeswoman said the
review covered 2016 to 2020 and acknowledged it had found weaknesses in the
agency’s response.
“The review found the challenge of simultaneously understanding and effectively
responding to the myriad of challenges associated with anomalous health incidents
complicated the agency’s response during this time period,” said Susan Miller, a
spokeswoman for the C.I.A.
The report, which went to lawmakers on Capitol Hill on Wednesday, is largely
141.5589 10/15/2022222% M
Report Criticizes C.I.A.'s Initial Handling of Havana Syndrome Cases... https://www.nytimes.com/2022/10/14/us/politics/cia-havana-syndrom...
classified. Victims called on the government Friday to declassify the report, or at least
its conclusions.
“It is imperative the report be released to the public as victims deserve to know what
actually occurred,” said Marc E. Polymeropoulos, a former C.I.A. officer who suffered
Havana syndrome symptoms on a trip to Moscow in 2017. *The delay in health care
that many suffered complicated their recovery.”
The Office of Medical Services has long been criticized by C.I.A. officers who sought
treatment for symptoms related to Havana syndrome.
During the Trump administration, many officials were deeply skeptical of the Havana
syndrome incidents, influenced by an F.B.I. document that concluded that many of
them could be psychosomatic responses. A subsequent study by outside experts
overseen by the National Security Council and the Office of the Director of National
Intelligence has said in many cases the physical injuries to the brain cannot be
explained by stress or other psychological illness.
Soon after becoming C.I.A. director, William J. Burns removed the head of the Office of
Medical Services, replacing him with a physician focused on patient care.
Mr. Burns also made it easier for C.I.A. officers to see brain injury experts at the
Walter Reed National Military Medical Center. In the statement, Ms. Miller
emphasized that the C.I.A. has taken steps to improve the health care provided to
officers who have reported Havana syndrome symptoms.
“Аз we learn from the past and look to the future, we have expanded access to care and
resources significantly over Ше past year and a half,” she said.
Many experts who have studied brain scans of victims are convinced that at least some
of the incidents were caused by directed energy or radio waves.
But calls by the C.I.A., the State Department and the Pentagon early in the Biden
administration for government officials to report possible incidents yielded hundreds
of reports, most of which turned out to be explained by environmental causes or
undiagnosed medical conditions.
The C.I.A. has been investigating the incidents with a new team of officers since Mr.
Burns took over. While some victims believe the incidents were caused by a foreign
power, the C.I.A. investigators have not found any evidence to support that conclusion.
Some individual incidents could have been the result of hostile action or a listening
device turned into a weapon, but no single adversary appears to be responsible for the
various incidents around the world, according to government officials.
/
3420569 10/15/202222246 PN
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
543 / 569 543 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
545 / 569 545 / 570
HA TREES escis 25-3 | 358.570
USA - NEVADA - AREA 5
w q mm ` A23". ә ف ь-4 E ^
we \A/ADALIAI(CS
VV AW AS. IN К =
AWAN MILITARY INSTALLATION [
` |52
(
f. OFF LIMITS TO
UNAUTHORIZED PERSONNEL- `
AUTHORITY: Internal Security Act, 50
ANI NO U.S.C. 797 |
: 65 | PUNISHMENT: Up to one year
АД 5 < С and 55,000. fin
x | z ”
X Y X Y Ww Ужин < <
imprisonment , 7
e.
24 1
сте,
y
AREA 51 AND S4 IN RELATION TO LAS VEGAS.
Basin and
Mot
Range
Notional
е > Monument
/
«Inyo Майопа!
Forest !
| White Mountains
Ansel Айат ` | Wilderness
Wilderness
75
Sierra National | Nevada
Forest “Test and
Training
Flectronic Ran e
john Мии Combot Nevada g
Vilderness gfe National (N TTR)
( )
Desert
Sequoia- Inyo- Mountains National
Kings Canyon Wilderness Wildlife
Wilderness Refuge
nil Death Valley
National National
T Park
[ “Visalia i t è Gorden Spring
irout Wilderness RED THY ine
Pahrump Notional у /
Recreation’: Las Vegas
Area [
| Porterville ЦД.
| Г Hende
Sequoia
Notional
Forest Naval Air
Warfare
| Center
Po | зер China Lake 89 / 340 'angston 100 / 570
у
?nnne
USA - AREA 51 MAIN BASE AND AIRPORT.
LS
и. You
2105 Angeles
5%
<; “ы
a T
Зап Francisco
WHERE IS AREA 51?
шы
со
ж
<
ос
>
а-
шы
=
>=
y.
е
e
№
ж
t5.
ж
5
=H
c
ad
=
шн. m. |
LT 104
T ащ
в
This is what it looks like when you dump tunnel rubble from а TBM,
the Tunnel Boring Machine.
аха тесто асеў
=
329/590
AREA 51 CIA AIRPORT AND
RESEARCH AND DEVELOPMENT
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
548 / 569 548 / 570
E
°
z
a
E
5
°
3
E
o
+
°
š
Š
£
-
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
556 / 569 556 / 570
CHEAP NAVY / SHIP RADAR FROM RAYMARINE. ==
\
SENSITIVITY
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
560 / 569 560 / 570
474-443 aac Ж тж
| у
o
„= A
a
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
563 / 569 563 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
565 / 569 567 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
562 / 569 562 / 570
Here is how you build a DIY (Do It Yourself) Radio If you look closely, the left black antenna metal plate is flat against
Warfare Defense System for less than $ 100.00 USD. E M the ceiling. The second (right plate) is about 3 centimeters below the
28 ^ ] ceiling. Both plates are perforated with holes (see close-up at the
bottom left). Then a power cable with crocodile clips is connected
between the two plates (or more correctly, the 2 black ceiling
antennas). This interconnection of the plates makes the signal hit
the metal plates slightly differently in time, and the cable between
them short-circuits the signal. To provide good peace of mind
throughout the installation room, you should then connect a ground
cable to the short-circuit cord, to guide everything present in the
black antennas straight down into the ground. What would now have
been microwaves in the room, which bounce around, are first
collected, then short-circuited with themselves, and the residues are
then led down and neutralized in the ground or soil.
The left one is flat against the ceiling. The right one is 2 to 3 cm
from the roof. Both antennas are perforated with holes.
Grounding kit. Drill and 15 meter satellite cable - $ 15.00 USD.
Use only the center copper wire. The outer protects the ground wire.
Connect the center wire to the top and hit the drill into the ground.
н:
fea This microwave oven
door stops 1 KW.
ие am ту
MICROWAVE OVEN DOOR WITH NET HOLES. ¿BB DEDE = ê rab un
An even more powerful construction can be achieved by applying heavy magnets to the construction. | can show you later.
522222111113.
222111111141)
212111111111)
222241411144.
711222422222 осоо»
"771222242444 44444 44-4
A
^
^
^
a
^
^
a
a
^
^
a
^
a
a
^"
“
"e "$5205232025052$52523552522252
You can contact me at security.terminal@gustavnorstrom.com - ог via telephone - 00 46 073 970 26 00.
This working prototype can be studied where it is built in Sweden. Heden 132 Bolinas, 821 31.
— Го? course have more advanced systems, but this опе is cheap, works and provides relax for your head.
Owner of this Website and Military Contractor: Mr. Gustav Norstrom.
w Working on the behalf of The Royal Kingdom of Sweden.
Direct Telephone Number: 00 46 (0) 73 970 26 00.
121/ 569
—— dec ы Жо
SATELLITE HIJACK
ANTENNA. ATCHING PLATES. ALKIES FROM ñ
BAOFENG ІМ
HINA.
|
: | | 4 | | | i
| ‘SWEDISH FLAG.
_ \
PRINTED |
‚ № ~
GRAFITTI ? í A
IMAGE FROM | ES í
LOS ANGELES. | та
ANOTHER SATELLITE
ANTENNA.
OLA WALL PROJECTOR
` E ——
- l А - um +
ХУА 5-4 [ANTENNA-CONSTRUCTION] 2 -— №
7“ : - ; , SIGNAL таа
SOLDER! ке
STATION
BY GUSTAV NORSTRÓM.
INVESTIGATION-FACTFI NDING-EXPERIMENTAT ON.
MY RESEARCH AREA. e
ELECTRIFIED MICROWAVE
1 WALKIE-
A AMMUNITION BOXES .
MOSTLY CALIBER
алон р ы | UN 7.62 тт.
1565 / 570
END NOTE.
2 X SPEED OF LIGHT.
FLASHLIGHT.
Albert Einstein said that nothing could travel faster than the speed of light.
It was a popular thinking for some time. —But it'S wrong. —1 say.
--ІГІ throw away a flashlight, at the speed of light, and then turn on the light (pointed forward іп the throw
direction). The light will travel away from the flashlight at a 2 X SPEED OF LIGHT. That's it.
Like, if you drive a car at 100 kilometers per hour. (100 KM/H - 62 MPH/Miles Per Hour).
And then turn on the headlights, full power. The CAR HEADLIGHTS will travel at LIGHT SPEED ғ 100
KM/HOUR. Your CARS BACKTAIL LIGHTS will send out RED LIGHT at LIGHTSPEED minus 100 КМ/Н.
The lightsource is already moving. / GUSTAV NORSTRÓM. SWEDEN. 740621-1750.
T
567 / 569 277 / 340 568 / 570
Gustav Norstróm
U.S. Department of Defense
568 / 569 569 / 570
TOP SECRET//SI/TK//NOFORN
ЕУ 2013
Congressional Budget Justification
Volume I
NATIONAL INTELLIGENCE PROGRAM SUMMARY
FEBRUARY 2012
TOP SECRET//SI/TK//NOFORN
“WA WR TOPSECRET/SI/TK//NOFORN LA BN
АҒ.
Access to the information in this document
is restricted to US citizens with active SCI
accesses for SPECIAL INTELLIGENCE and
TALENT-KEYHOLE information.
DISSEMINATION CONTROL ABBREVIATIONS
NOFORN - Not Releasable to Foreign Nationals
This Component Budget of the National Intelligence Program is
produced pursuant to provisions of Executive Order 12333, as
amended by Executive Order 13470, and section 102A(c) of the
National Security Act of 1947, as amended.
NATIONAL SECURITY INFORMATION
Unauthorized Disclosure Subject to Criminal Sanctions
" —— ш ит жо жї у
АФ 7 24.2 2.2 22.2 АУ АР #7 АР У Др
МАЛЧА, TOP SECRET//SI/TK//NOFORN N, @, W.
TOP SECRET//SI/TK//INOFORN
(U) DIRECTOR OF NATIONAL INTELLIGENCE STATEMENT
(U//FOUO) The Intelligence Community (IC) is crucial to ensuring the Nation's safety and security. We face
worldwide threats that are expanding in scope and complexity. This Fiscal Year (FY) 2013 National Intelligence
Program (NIP) budget reflects hard choices to ensure critical national security requirements are addressed in the
face of a reduced budget environment. We must be prepared to accept -- and manage -- reasonable risk.
(U//FOUO) Keeping America safe by providing the finest intelligence support to our policymakers, military,
law enforcement partners, and allies remains our highest priority. With the superb talent and ingenuity of our
workforce, the IC will continue to deploy the most technologically sophisticated and innovative intelligence
capabilities in the world. Through integration and efficiency, we will sustain responsive, insightful intelligence
support.
(S//NF) The FY 2013 NIP budget of $52.6 billion (including $4.9 billion for Overseas Contingency
Operations (OCO)) and 107,035 positions supports the National Intelligence Strategy and advances our Nation's
security priorities. This budget represents a decrease of $1.3 billion, or 2.4 percent, below the FY 2012 enacted
level; and it reduces personnel by 1,241 positions, or one percent. The request meets the fiscal demands laid out
in the Budget Control Act by setting the IC on a path to reduce expenditures by $25 billion for ten years; with
over $15 billion of that amount saved by FY 2017.
(U) Developing a Balanced Intelligence Budget
(S) The IC leadership worked as a corporate body to develop the budget. The team first drew on lessons learned
from the drawdown іп the 1990s, which left the IC with a distorted workforce that lacked sufficient mid-career
personnel and technical expertise. As a result of that drawdown, the IC reverted to extraordinary measures to
rebuild and balance the workforce. Moreover, we deferred infrastructure recapitalization, resulting in obsolete
facilities, single point failures, and inadequate power, space, and cooling. We also delayed investment, reducing
our ability to keep pace with technical advances to meet mission needs.
(U) Second, we looked forward to determine how best to meet increasing mission requirements over the next
decade in a resource-constrained environment. The IC leadership weighed the relative merit of capabilities and
looked at dependencies across the components. In addition, we coordinated closely with the Defense and domestic
departments to minimize disconnects and ensure balance.
(S) At the outset, I determined that we would not take a proportional reduction from each IC program, but
rather compare relative merits of programs. We carefully weighed cost and risk to understand both the short
and long term impact of our actions. To maximize investments for the future, we focused reductions on lower
priority capabilities; sought efficiencies and smarter ways to do business; and prudently accepted risk. Overall,
this budget is guided by the imperative to achieve the right balance against competing demands. Our guiding
principles were to:
е (U) Sustain a skilled workforce;
e (U) Focus on further integration and collaboration;
e (U) Bolster agile capabilities that support multiple missions;
* (S) Enhance counterintelligence; and
e (U) Protect key investment for the future.
TOP SECRET//SI/TK//INOFORN 1
TOP SECRET//SI/TK//INOFORN
(U) Reductions
(U) To the extent possible, we protected the activities highlighted above; but with the magnitude of the
reduction, we could not avoid limited, targeted cuts to priority areas. The following are some activities reduced
from the base budget plan:
(S//NF) Sustained Congressional Cuts. We sustain FY 2012 cuts to the CIA's Global Deployment Initiative
and NRO's Integrated Ground Architecture.
(S) Workforce. We continue Congressional reductions to the government workforce; curtail plans for future
personnel growth, and take targeted reductions to baseline personnel where the risk can be managed.
Furthermore, we reflect savings from a lower than projected civilian pay raise and continue to reduce our
reliance on core contractors.
(TS//NF) Operations. We decrease collection, production, and hard copy media generation in the GEOINT
system, slow SIGINT network exploitation and processing modernization; cut GDIP HUMINT, non-core
MASINT, covert action programs, and some Specialized Reconnaissance Programs (SRP) operations;
and streamline the ODNI business transformation activities. Furthermore, we discontinue or terminate
some lower-priority missions, such as de-orbiting the Baseline ONYX satellite and transferring funding
responsibility to the MIP for legacy satellites.
(S//TK//NF) Long-Term Investments. We are terminating an NRO compartmented project, delaying
TOPAZ performance enhancements until the second generation of TOPAZ satellites; and reducing
technology insertion opportunities in other satellites. In addition, we are delaying some SRP investments
and terminating the Community’s investment in a consolidated human resources information system.
(S//NF) Infrastructure. We reduce enterprise management activities; eliminate the IC Data Center;
downsize the IC Bethesda Campus; suspend some facility improvements; and delay the replacement of
aged facility components. As a result, we will continue to house some of the IC workforce in older and less
capable facilities that may not meet current antiterrorism/force protection requirements and we will accept
some degradation in the IC’s facility condition index.
(S//NF) Information Technology. We reduce capital equipment replacement and recapitalization; decrease
support for heritage systems; delay consolidation of older systems; and eliminate plans for additional backup
systems. These offsets prevent spending to sustain or improve legacy environments when our direction is
to establish a new IT environment based on more centralized common services. Investments required to
establish a more efficient IC IT Enterprise are protected.
(U) Investments
(U) Although the budget is declining, the mission is not. Prioritizing our requirements was a key element to
produce a budget that meets customer needs, supports critical capabilities, addresses gaps, and helps to maintain
a strategic advantage. In the FY 2013 NIP budget, the IC makes targeted investments in:
(TS//SU/NF) Signals Intelligence (SIGINT). We are bolstering our support for clandestine SIGINT
capabilities to collect against high priority targets, including foreign leadership targets. Also, we are
investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit
internet traffic.
(S//NF) Cybersecurity. As the cyber threat continues to grow, we sustain the budget for the Comprehensive
National Cybersecurity Initiative and begin construction of a second High Performance Computing Center
at Fort Meade, Maryland to keep pace with cyber processing demands.
TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//INOFORN
e (TS//NF) Counterintelligence (CI). To further safeguard our classified networks, we continue to strengthen
insider threat detection capabilities across the Community. In addition, we are investing in target
surveillance and offensive CI against key targets, such as China, Russia, Iran, Israel, Pakistan, and Cuba.
е (S//TK//NF) Major System Acquisitions (MSA). We are sustaining the acquisition baseline and maintaining
the schedule for the MSAs that replace current capabilities. For example, the NRO is modernizing overhead
SIGINT, geospatial, and communications major system acquisitions. To reduce reliance on the Tracking and
Data Relay Satellite System (TDRSS), the NRO begins investing in a special communications capability.
Also, launch requirements are fully funded.
* (S//NF) Ballistic Missile Collection. We are pursuing an affordable MASINT solution for integrating,
improving, and sustaining coverage of and collection against North Korean, Iranian, Chinese, Russian,
Pakistani and other ballistic missiles threats.
° (S//NF) Mission Focused Science & Technology (S&T). We continue investing in cutting edge S&T that
enables new mission capabilities. We are tackling hard problems in quantum computing, biometrics, cyber,
weapons of mass destruction, and large complex data sets.
(U) Optimizing Our Efforts
(U) To succeed, the IC must employ its resources judiciously. The need to integrate all elements of the IC
is essential to identify opportunities as well as dangers. In FY 2011, the elimination of Usama Bin Ladin along
with 32 other high value targets is just one testament to IC collaboration. Our ability to rapidly respond to
the requirements of Operation Unified Endeavor, while simultaneously maintaining support for operations in
Afghanistan, Iraq, and around the world, is another. We achieved this by reducing the cultural, technological and
policy barriers to sharing information, and exploring new strategies for integrating our intelligence efforts. The
FY 2013 budget sustains the imperative of integration, and provides the framework and common solutions to
further collaboration.
(U) Focusing on Integration
(U) The Office of the DNI has promoted information sharing and collaboration through the integration of
analysis and collection at the strategic level. This has improved mission management of key intelligence problems,
leading to a sharper focus on, and encouragement of, integration within the Community. The heightened attention
on intelligence integration has changed the dynamics of intelligence activities. Without requiring individual IC
elements to reorganize, the emphasis on integration has led Community elements to think and operate in ways
that are responsive to strategic management and direction that encourages, recognizes, and rewards integrated
intelligence operations.
(U//FOUO) The National Intelligence Managers (NIM) are the principal agents of mission integration. They
oversee and integrate all aspects of the IC's efforts against a particular regional or functional problem to provide a
more complete understanding of the associated issues. A major responsibility includes the development, planning,
execution, and oversight of Unifying Intelligence Strategies (UIS) for their individual accounts, with the principal
aim of managing the relevant policies, priorities, and relationships among the IC elements who participate in
each of these target domains.
(U//FOUO) These UIS are the instruments that are used to integrate IC efforts against critical priorities. Each
UIS supports decision-making by outlining gaps and challenges, as well as opportunities that would most benefit
from integration of IC efforts. In addition, the UIS present a select number of integration initiatives to provide
a holistic perspective across the strategies.
TOP SECRET//SI/TK//INOFORN 3
TOP SECRET//SI/TK//NOFORN
(U) Promoting Information Sharing
(U) Information sharing also is a critical enabler of integration across the Community. This budget begins to
implement a restructuring of the IC information technology (IT) architecture that will provide a strong backbone
enabling greater IC integration, information sharing, and improved safeguarding of networks. The need for the
IC to contribute to deficit reduction was the catalyst for achieving greater efficiencies in information technology.
The IC IT Enterprise will transform from agency-centric IT programs which are often duplicative and costly, to
greater centralization of common services for IC-wide use. Within this framework, we are leveraging existing
efforts across the Community and sustaining unique approaches only when they are essential to the mission.
Furthermore, we are investigating data management solutions and their associated security issues, such as the
viability of comingling data in virtualized data stores to facilitate analytical integration of different data from
different sources and Agencies. This includes new management and operating practices for the secure storage and
handling of the varied information contained in different intelligence systems through the use of cloud computing.
(U) Engaging Partners
(U) Expanding the IC's culture of sharing with our partners is essential to leverage and maximize our collective
capabilities. We are strengthening relationships with federal, state, local, tribal, and international partners to fuse
domestic and foreign intelligence to quickly understand and act on threats. Through coordinated efforts, we can
optimize our efforts to improve intelligence support.
(U) As part of the Administration's overall foreign trade initiative, the IC will more closely coordinate its
intelligence gathering and analysis efforts with federal agencies responsible for monitoring foreign trade barriers
and enforcing U.S. trade rights under international trade agreements. The IC will directly support and strengthen
U.S. interagency trade enforcement efforts to address unfair trade practices through the World Trade Organization
and under other domestic and international trade enforcement authorities
(U) Furthermore, the IC is postured to support the warfighter as the Department of Defense implements a new
strategy. The strategy is consistent with the IC approach to the FY 2013 budget. We will support the increased
focus on the Pacific region, and surge as needed for military operations. In addition, we expect there will be a
greater reliance on the IC to provide global coverage and warning of emerging threats.
(U) Aligning Resources
(U) This year, the IC implemented guiding principles to clarify responsibility for programming NIP resources.
(S) The IC developed guidelines to more clearly delineate programming responsibility for the NIP and the
МІР to further optimize resource allocation. These guidelines better align МІР and МІР resources with mission
requirements, reduce the number of split funded projects, and enable more efficient budget execution. The
FY 2013 budget begins to implement the guidelines by transferring $165 million and 1,078 positions between
the NIP and MIP. This transfer maintains the mission, function, and execution of activities; it does not represent
growth in either program.
(S) In addition, the DHS Office of Intelligence and Analysis (I&A) implemented a change in how it accounts
for resources that support the intelligence mission. Beginning in the FY 2013 budget, activities that predominately
support departmental missions are funded outside the NIP. Under the new methodology, $11 million and
44 positions are transferred out of the NIP.
(U) Supporting Current Intelligence Operations
(S//NF) In FY 2013, the IC will continue to provide crucial intelligence support to military operations in
Afghanistan and to combat terrorism worldwide.
(S//SI//NF) The request for Afghanistan and Pakistan decreases as support for the military's counterterrorism
and counterinsurgency operations declines, coincident with planned troop reductions. Accordingly, this request
sustains HUMINT and CI operations, along with the related analytic, processing, and exploitation capabilities.
4 TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//INOFORN
Also, NSA is augmenting SIGINT access and penetration, and Treasury enhances threat finance analysis to track
terrorist and insurgent networks.
(TS//NF) With the completion of the military drawdown in Iraq, intelligence support transitions to a smaller
long-term presence. The IC's request is significantly reduced from FY 2012 as our support focuses on providing
foreign intelligence in support of diplomatic activities and monitoring Iraq's plans and intentions and those of its
volatile neighbor, Iran. This budget sustains HUMINT operations, with a smaller footprint, as well as SIGINT
collection capabilities. Most support for media exploitation, commercial imagery, and other operational enablers
is eliminated.
(TS//NF) The counterterrorism (CT) mission requires a global perspective to predict, penetrate, and preempt
global threats to U.S. security. Therefore, the IC is sustaining operations, analytic, and enabling activities. With
Yemen, Somalia, and other Horn of Africa countries emerging as the most recent breeding ground for terrorism,
the IC is increasing efforts in those regions. Furthermore, we are sustaining CT capabilities in Libya to deny
extremists a safe haven. In an effort to reduce our reliance on OCO as a funding vehicle, we transfer to the base
some enduring long term activities.
(S//NF) The counterproliferation (CP) mission continues to support a variety of actions to deter, disrupt, and
prevent proliferation. This includes improving our understanding of Pakistani nuclear weapons and dangerous
nuclear material security; intelligence on proliferators, such as Iran and North Korea, to roll back and block
weapons programs; increasing our ability to ascertain global chemical and biological threats; and better
integrating multidiscipline coverage of WMD targets such as chemical weapons in Libya and Syria.
(U) Moving Forward
(S//NF) Today's national security threats virtually defy rank-ordering. Capabilities, technologies, know-how,
communications, and environmental forces are not confined by borders, and can trigger transnational disruptions
with astonishing speed. Never before has the IC been called upon to master such complexity and so many issues
in such a resource-constrained environment. We are rising to the challenge by continuing to integrate the IC,
capitalize on new technologies, implement new efficiencies, and, as always, remaining vigilant 24/7 worldwide.
(U//FOUO) The pressure to maintain the world's premier intelligence enterprise in the face of shrinking
budgets will be difficult. We will accept and manage risk, more so than we've had to in the last decade.
(U//FOUO) This NIP budget proposed is balanced and executable. It does not reflect the potential for a
sequester in January 2013. Instead, the FY 2013 President's Budget proposes savings in other areas that exceed
the Joint Committee threshold, and as a result seeks to cancel the automatic reductions and restore the caps to
the original definitions in the Budget Control Act.
(U) Intelligence 15 the first line of defense. This budget provides the programs and initiatives vital to our
national security. Our partnership with you -- our Congressional oversight committees -- is critical to our
collective success. With your continued support, the IC can continue to fulfill our mission to keep America and
its interests secure.
we Маре
TOP SECRET//SI/TK//INOFORN 5
TOP SECRET//SI/TK//INOFORN
FY 2013 Mission Objective Funding*
$52.0 Billion
CIARDS funding not included.
Enhance
Cybersecurity
8%
Integrate
Counterintelligence
796
Combat Violent
Extremism
3396
Provide Strategic
Intelligence and Warning
39%
Counter Weapons
Proliferation
13%
* MO6: Support to Current Operations is covered іп other МО sections.
Figure 1.
This Figure is SECRET//NOFORN
118030 vol01 ill01.ai
TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//INOFORN
FY 2011 Intelligence Community Civilian Workforce
Grade Distribution by Average Age
30000 —— Y h U R 15
25,000 —
— 60
2
m
S 20000 — и B
8 = -45 Š
-
1 р. = ka
° 5,000 m 5
8 - 30 Е
E 10,000 — 3
< m
= m — 15
5,000 B Ы _
= Ш
о ———— не ние ни мын мае ни ни ми ны | _ | | ‚ _ Lo
Grade (57-10 GS 11-12 GS 13-14 GS-15 ae Payband Payband Payband mem SES
6 Below 1 2 3 4 5
Ш Average Age ІП Average Years of Service
Grade by Years of Service
100
ш >35
Ш 31-34
" 80 — m 26-30
o Ш 21-25
е ш 16-20
м Ш 11-15
= Е E
z 60 m 6-10
5 ш 1-5
Ф
1
@ 40 — ш <
t
o
е
o
E 20 —
Grade | GS 7-10 GS 11-12 GS 13-14 GS 15 Payband Payband Payband Payband Payband SES
6 Below 1 2 3 4 5
Note: This chart contains data adjusted to facilitate display іп whole percentages only and some categories with <0.50% will display ав 0%. Actual percentages are available upon request.
Figure 2.
This Figure is SECRET//NOFORN 118030. vol01 ill02.ai
TOP SECRET//SI/TK//INOFORN 67
TOP SECRET//SI/TK//INOFORN
FY 2011 Intelligence Community Civilian Workforce
Years to Optional Retirement
Analysis & Production
Collection & Operations
Enterprise IT
Enterprise Mgt & Spt
Mission Mgt
Budget Category
Processing & Exp
Research & Tech
Total
Percentage of Workforce
WiRetElig. Ш<1 N2 ШЗ N4 №5 86-10 811-15 Ш16-20 821-25 126-30 831-35 №>35
Note: This chart contains data adjusted to facilitate display in whole percentages only and some categories with «0.5076 will display as 0%. Actual percentages are available upon request.
Budget Category by Grade Levels
Analysis & Production
Collection & Operations
Enterprise IT
Enterprise Mgt & Spt
Mission Mgt
Budget Category
Processing & Exp
Research & Tech
o
N
o
B
o
o
©
со
©
EN
o
o
Percentage of Workforce
Е Grade Ш GS 7-10 № GS 11-12 EGS 13-14 Ш GS 15 Bl Pay Band 1 M Pay Band 2 В Pay Band 3 В Pay Band 4 В Pay Вапа 5 № SES
ы Note: This chart contains data adjusted to facilitate display іп whole numbers only. Actual figures are available upon request.
Figure 3.
116030 уо101 ill03.ai
This Figure is SECRET//NOFORN
68 TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//INOFORN
FY 2011 Intelligence Community Workforce
Total Civilian, Military, and Contractor Personnel Workforce
by Personnel Type and Budget Category
Civilian
Military
Contractor
Total Workforce
By Personnel
Type
HES
ш Mission Mgt
Ш Collection
& Operations
Civilian Personnel
Military Personnel № Processing & Exp
№ Analysis 8
Production
W Research & Tech
Wi Enterprise ІТ
m
Contractor Personnel
By Budget Category
Total Workforce
Enterprise
0 20 40 60 80 100 Mgt & Spt
Note: This chart contains data adjusted to facilitate display in whole percentages only and some categories with «0.5096 will display as 0%. Actual percentages are available upon request.
Civilian Workforce/Attrition
100,000 Ыб
82,363 84,159 83,675
80,000 — US
—4
60,000 —
=3
40,000 —
—2
20,000 — 4
0 0
FY11 FY12 FY13
ШЇ + Positions —1 — % Attrition (FY11 Actual, FY12-13 Projections)
Figure 4.
This Figure is SECRET//NOFORN 118030. vol01 ill04.ai
TOP SECRET//SI/TK//INOFORN 69
TOP SECRET//SI/TK//INOFORN
FY 2011 Intelligence Community Workforce
Military Workforce/Fill Rates
25,000
20,000 —
15,000 —
10,000 —
5,000 —
FY10 FY11
№ Military Filled [E] Military Unfilled
Foreign Language Proficiency Payments:
Total NIP*
Top Foreign Special Interest
Languages Civilian Languages Civilian
Spanish 2,725 Tagalog 62
French 827 Indonesian 48
Chinese (All Dialects) 903 Hindi 73
Arabic (All Dialects) 1,191 Somali 5
Russian 736 Pashto 88
German 521 Persian - Afghan (Dari) 96
Korean 490 Urdu 89
Persian (Farsi) - Iranian 357 Punjabi 45
Portuguese 295 Hausa 3
Other Languages ** 1,639
Total 10,193 Total Special Interest 509
*Includes payments to 7,507 U.S. Government civilian personnel in CIA,
DIA, FBI, NGA, NSA, and others included in the program volumes.
**There are up to 71 "Other" Languages for which proficiency payments
are made. The complete list is available upon request.
Figure 5.
This Figure is SECRET//NOFORN
118030 vol01 ill05.ai
70
TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//INOFORN
FY 2013 Request by Program
$52.6 Billion
State -r Treasury
«196 «196
SRP
296 L:
NGP
9%
GDIP
8%
Energy -/
<1%
DOJ
6%
CIAP
28%
CMA
CIARDS
° 1%
DoD-FCIP
1%
1%
Figure 6.
This Figure is SECRET//NOFORN
116030_vol01_ill06.ai
T2 TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//NOFORN
Central Intelligence Agency Program
FY 2013
Funding by Budget Category
Processing & Exploitation
%
Mission Management Research & Technology
<1% | 1%
r —- Analysis & Production
7%
Enterprise Management
& Support `
7%
Enterprise IT —
4%
Collection & Operations
78%
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013
25,000
20,000 —
o
5
Е 15,000 —
>
E
nd
E: 10,000 —
o
A
5,000 —
Q لل LL | LL. L J
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
Figure 7.
This Figure is SECRET//NOFORN 118030. vol01 ill07.ai
74 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//INOFORN
Community Management Account
FY 2013
Funding by Expenditure Center
Analysis
3% Enterprise IT
Systems
10%
Research &
Technology
20%
Enterprise
Management
36%
Mission Management /
Tasking
31%
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013
2,500 — ——————— 2,500
2,000 —
o
5
= 1,500 —
=
Е
2
3 1,000 —
©
a
500 —
إا | إا | ا ا الل ں0 | |
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
Figure 9.
This Figure is SECRET//NOFORN 118030. vol01 ill09.ai
80
TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//NOFORN
Consolidated Cryptologic Program
FY 2013
Funding by Budget Category
Research & Technology
0,
4%
| Analysis & Production
14%
Processing & Exploitation
о,
о
Mission Management
3%
Collection & Operations
23%
Enterprise Management
& Support
26%
Enterprise IT
15%
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013
uu E БЕРЕН аны
27000 —
o
С
9
=
© 18,000 —
2
0
©
a
9,000 —
gll l----
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
Figure 10.
This Figure is SECRET//NOFORN 118030. vol01 ill10.ai
84 TOP SECRET//SI/TK//INOFORN
TOP SECRET//SI/TK//INOFORN
National Reconnaissance Program
FY 2013
Funding by Budget Category
Research & Technology
0,
4%
Processing & Exploitation
%
Collection & Operations
Enterprise Management 59%
& Support
8%
Enterprise IT
5%
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013
12,000 ———————————— 3,000
pp == == "==
А 2,000 -
2
>
E
o
2
20%
©
© 1,000 —
Q — LLL...
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
Figure 14.
This Figure is SECRET//NOFORN 118030. vol01 ill14.ai
100 TOP SECRET//SI/TK//INOFORN
Resource Exhibit No. 1A
National Intelligence Program
Funds by Program
FY 2011 – FY 2017
This Exhibit is SECRET//NOFORN
TOP SECRET//SI/TK//NOFORN
(Dollars in Thousands)
FY 2012 - FY 2013
Change FY 2013 -
FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 FY 2017
Program Actual Appropriated Base oco Request Funds Percent Total!
CCP 10,737,163 10,514,035 10,036,851 730,914 10,767,765 253,730 2 50,652,537
CIAP 14,652,379 15,332,901 12,037,708 2,672,317 14,710,025 -622,876 -4 64,567,982
CIARDS 292,000 513,700 514,000 — 514,000 300 — 2,570,000
CMA 2,063,394 1,870,255 1,676,387 — 1,676,387 -193,868 -10 10,274,665
DHS 275,136 307,359 284,332 — 284,332 -23,027 -7 1,462,089
DoD-FCIP 517,720 505,895 456,475 72,485 528,960 23,065 5 2,487,905
DOJ 2,978,329 3,010,795 3,019,958 — 3,019,958 9,163 — 15,596,944
Energy 163,700 186,699 188,619 — 188,619 1,920 1 943,095
GDIP 4,767,009 4,815,583 3,655,662 714,480 4,430,142 -385,441 -8 19,901,677
NGP 5,227,945 5,041,569 4,339,195 539,735 4,878,930 -162,639 -3 22,786,959
NRP 11,401,745 10,411,335 10,268,773 53,150 10,321,923 -89,412 -1 54,842,860
SRP 1,466,792 1,267,751 1,099,820 33,784 1,133,604 -134,147 -11 6,010,922
State 68,773 68,203 72,655 — 72,655 4,452 7 377,056
Treasury 27,422 27,123 27,297 — 27,297 174 1 138,274
МР Total 54,639,507 53,873,203 47,677,732 4,876,865 52,554,597 -1,318,606 -2 252,612,965
IFY 2013-2017 Total includes the ОСО Request for FY 2013 only.
ТОР SECRET//SI/TK//NOFORN 133
TOP SECRET//SI/TK//NOFORN
Resource Exhibit No. 1B (Number of Personnel)
National Intelligence Program (Number of Positions)
Total Personnel! and Total Positions? by Program
FY 2011 - FY 2013
This Exhibit is SECRET//NOFORN
FY 2012 - FY 2013 FY 2012 - FY 2013
FY 2011 Actual FY 2012 Authorized FY 2013 Request Change Change
Total Total Total Total Total Total Total Total
Program Personnel Positions Personnel Positions Personnel Positions Personnel Percent Positions Percent
CCP — 3436] 3436] 35083 35083 3490 — 3490 ыу лл -18 — 4
CIAP 2126 2146 2220 21459 22200 у — — — —
GARD a О шш ле д. (522. 42-52-4222 = у 5
CMA 179 з 172 194 183 199 л 4 35 Q0
DHS 2768 88 94 100 885 95 35 —6 35 4
DoD-CIP 2099 212 2132 227 221 232 19 6 Ws 5
DO) 1480 15097 1508 1535 1502 1538 шы о 4 -—
Energy 199 19 198 8 9 19 1 1 1 1
GDP 17202 1832 — 1130 1897 1729 1794 эз з 8035 3
NGP 875 868 883 892 851 8484 240230 мм 6
NRP е лә қы 2783 204 2773 3 ПП
SRP 29 29 w 29 w 239 — -— -— —
Stae 39900900 384 3X3 34 3 1 3 1
МІР Total 104905 106467 107389 108276 106,777 юз чє чм è 4
! Total Personnel is the sum of Civilian FTEs and Military Positions and excludes Foreign Indirect Hires.
^ Total Positions is the sum of Civilian Positions and Military Positions and excludes Foreign Indirect Hires.
134 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource Exhibit No. 2A (Dollars in Thousands)
National Intelligence Program
Funds by Program and Service/Agency
FY 2011 - FY 2017
This Exhibit is SECRET//NOFORN
FY 2012 - FY 2013
Change
Service/ FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 FY 2013 -
Program Agency Actual Appropriated Base осо Request Funds Percent FY 2017 Total!
Department of Defense, МР л
CCP AirForce 164934 168497] 151833 3523 16136 м а 830815
“Army 108003 107912 74444 21603 9604] -1L865 И 397401
Cure. = 837 1,046 E 1,046 209 25 5,404
NSA 10,394,017 — 10,177,996 9,750,818 705,788 10,456,606 278,610 3 49,141,080
Navy 70,209 58,793 52,710 = 52,710 -6,083 -10 277,837
ССР Total 10,737,163 10,14035 10,036,851 730914 10767765 253730 2 50,652,537
CIAP CIA 14652379 15332901 12037708 2,672,217 14710025 -622,876 4 64567982
CIAPTotl — 14652379 15332901 12037708 2,672317 147100205 -622,876 4 64567982
CMA AirForce 1390793 1322364 1136135 x LI36135 -186220 м 7384743
Рор-ЕСІР AirFoce — 122927 — 103390909 — 8732 — 9903 9725 — 6168 -6 462967
Amy — 9857 9803 91432 19360 — 11072 — 123533 В 510468
DIA 162,829 171,927 137,672 30,552 68,224 -3,703 2 760,843
DSS 3,588 3,625 7,386 = 7,386 3,761 104 36,720
DTRA 5,593 6,605 9,308 = 9.308 2,703 4l 43,821
Navy 124,926 122,306 123,355 12,670 36,025 13,719 1 673,086
DoD-FCIP Total 517,720 505,895 456,475 72,485 528,960 23,065 5 2,487,905
GDP AirFore 708306 73119] 610153 6844 616997 -114,194 — 6 3442095
Army 2675315 266867] 200066 23480 — 223546 — 43321 -16 1083545
DIA 3,225,544 3,267,174 2,412,077 739,613 3,151,690 -115,484 -4 13,186,766
с — = 479 = 479 479 = 2,173
Navy 488,152 477,668 432,887 4,543 437,430 -40,238 -8 2,237,100
SOCOM 77,492 72,683 = = = -72,683 -100 =
СПР Total |. 42767009 4,815583 3,655,662 774480 4430142 -385,441 -8 19,901,677
NGP . AirFoce 1015340 112930 тз — 114383 14583 1| 5220581
Amy — 482 52620 — 49052 — 4902 358 26457
NGA 5,068,107 4,860,907 4,160,116 539,676 4,699,792 -161,115 :3 21,912,709
Мауу 10,496 15,112 15,644 59 15,703 591 4 87,672
NGP Tot — — 5,227,945 5,041,569 4,339,195 539,35 4,878,930 116269 3 22786,959
NRP. NRO 11401745 10411335 10268773 — 53150 10321923 -89,412 — 1 54842860
МЕР Tot — 11401745 10411335 10268773 53450 1021923 89412 1 54842860
SRP Navy 1466/92 1267751 1099820 — 33784 1133604 — -134147 и 6010922
SRP Tot — — 1466,792 1267751 1,099820 33784 — 1133604 -13414] 11 6010922
Lm of Defense, NIP 50,161,546 49211433 43,030,619 4,876,865 47,907,484 -1,303,949 ES 228,635,585
Non-Defense, NIP
CIARDS CIARDS — 292000 => 513700 514000 — 51400 | 30 0 257.00
CIARDS Total 29200 = 513700 514,000 — 51400 30 X o 2570000
CMA CMA 672601 541890 5402532 .— 54022 — -1639 - 2889922
СМА Total — 61,41 541891 5402522 — — 5402532 лз 1 2889922
TOP SECRET//SI/TK//NOFORN 135
TOP SECRET//SI/TK//NOFORN
Resource Exhibit No. 2A (continued) (Dollars in Thousands)
National Intelligence Program
Funds by Program and Service/Agency
FY 2011 - FY 2017
This Exhibit is SECRET//NOFORN
FY 2012 - FY 2013
Change
Service/ FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 ЕУ 2013 -
Program Agency Actual Appropriated Base ОСО Request Funds Percent FY 2017 Total!
DHS 2. 22,687 47,717 51,101 = 51,101 3,384 7 262,715
DHS 252,449 259,642 233231 = 233,231 -26,411 -10 1,199,314
DHS Total — 2546 — 307359 28433223 — — — 28332 -23,027 Л 1,462,089
DO] DEA 158 зт 14123 — 01202244203 73059
FBI 2,964,751 2,997,148 3,005,835 — 3,005,835 8,687 0 15,523,885
DOJ Total 2,978,329 3,010,795 3,019,958 — 3,019,958 9,163 0 15,596,944
Energy Energy 163,700 186,699 188,619 — 188,619 1,920 1 943,095
Energy Total 163,700 186,699 188,619 = 188,619 1,920 1 943,095
Treasury Total 27422 лиз 27.2099 | — р 138274
Non-Defense, МР Total. 4477,961 4,661,770 4647113 — — 4647113 -14657 0 23977380
National Intelligence Program 54,639,507 53,873,203 — 47,677,732 4,876,865 — 52,554,597 -1,318,606 2 252,612,965
Total
IFY 2013 - FY 2017 Total includes the ОСО only for FY 2013.
136 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource Exhibit No. 2B (Number of Civilian FTEs)
National Intelligence Program (Number of Military Positions)
Total Personnel by Program and Service/Agency!
FY 2011 - FY 2013
This Exhibit is SECRET//NOFORN
FY 2011 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Change
Program Service/Agency Total Personnel Total Personnel Total Personnel Total Personnel Percent
Department of Defense, IP TTT
CCP AiFoce 537 545 530 35
Am 320 330 мз 46 4
Marine Corps — 393 392 -1 -0
NSA 20,877 21,650 21,575 -15 -0
Мауу 4,881 4,425 4,370 -55 -1
CCPTotal — зв 35083 39 482 4
CAP CA 2106 эш 2336 — —
САРТ i 21426 22296 26
CMA AiFoce 98 102 1M — - 4
CMA Total g, 402 AM 5 —
DoD-FCIP _ AirFoce | 0 m TD6 M 2
ОО Amy ж зэ 3A 83 10
DIA 310 336 367 31 9
DSS 9 9 14 5 56
DTRA 33 36 40 4 11
Marine Corps 13 13 17 4 31
Navy 529 527 536 9 2
DoD-FCIPTotal = 29 м ot 9 6
GDP AirFore à3M| 3234 298 29 8
КОО Amy — 104 4M6ó Mu M5 9
DIA 10,180 10,295 10,653 358 3
Marine Corps — 224 268 44 20
Navy 2,459 2,305 2,292 -13 -1
SOCOM 358 358 — -358 -100
GDIPToal — M22 1520 QY29 зз 23
NOP AiFoe — 24 29») N| 5 23
(00 Amy 4 250 24 36 4
Marine Corps — 6 35 29 483
NGA 8,224 8,233 7,943 -290 -4
Мауу 25 32 30 -2 -6
езт. 895 883 8589 эзш 3
NRP. AiFot MT AST A68 — 4 3
| Amy 2 02 3m — .—. —
NRO 972 976 975 -1 -0
Мауу 296 296 289 -7 -2
NRP м0 эз. 29M 3 1
SRP Nay ж ee
SRPTotal = 29 >» 249 — —
Department of Defense, NIP Total 8788 8998 8936 à 4
Non-Defene,NIP x т”
CMA CMA 156 890 и
СМАТО — OG 60 756 7] . H
Excludes Foreign Indirect Hires
TOP SECRET//SI/TK//NOFORN 137
TOP SECRET//SI/TK//NOFORN
Resource Exhibit No. 2B (continued) (Number of Civilian FTEs)
National Intelligence Program (Number of Military Positions)
Total Personnel by Program and Service/Agency!
FY 2011 - FY 2013
This Exhibit is SECRET//NOFORN
FY 2011 Actual | FY 2012 Enacted БҮ 2013 Request FY 2012 - FY 2013 Change
Program Service/Agency Total Personnel Total Personnel Total Personnel Total Personnel Percent
DHS CGNonDoD > I 259 ж ооо у ту
| —pHsS 90 | 4b G6 -4d 9
DHS Total = 72 949 885 85 6
DO) DEA 38 9
FBI 14,742 15,000 15,014 14 0
DOJToal = 1480 15058 ИИ
Energy Energy 49 оӊ Mw 1 1
Energy ва
State State 359 360 363 3 1
State Total 359 360 363 3 1
Treasury м
Treasury Total — 148 18 1856 1 1
Non-Defense, NIP Total |00 O ma лала 4 o
National Intelligence Program Total — 104905 107,389 10677 62 1
Excludes Foreign Indirect Hires
138 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 5 (Dollars in Thousands)
National Intelligence Program
Budget Authority by Program and Appropriation
FY 2011- ҒҮ 2017
This Exhibit is SEC RET//NOFORN
Program Appropriation FY 2011 FY 2012 FY 2013! FY 2014 FY 2015 FY 2016 FY 2017
CCP FamHsyConAF SM зш 2-22 2-0000-
— C НМА 405 419 3453 348 346 342 3642
Fam Hsg O&M, DW 10,402 10,250 10,973 11,147 11,335 11,527 11,883
MilCon, DW 707,947 361,753 562,030 507,553 125,698 53,000 47,321
O&M, A 108,003 107,912 96,047 72,698 74711 76,287 77,658
O&M, AF 160,832 164,328 157,893 162,002 161,848 164,988 166,653
O&M, DW 6,644,135 6,807,617 7,007,018 6757464 6,758,435 6,967,731 7,056,018
O&M, MC = 837 1,046 1,061 1,081 1,101 1115
O&M, N 70,209 58,793 52,710 54,756 55,810 56,932 57,629
P, DW 403,589 336,503 369,762 348,313 323,805 324,545 322,735
RDT&E, DW 2,627,944 2,661,873 2,506,823 2,370,319 2248074 2,221,552 2,206,019
CCPTotal 10731163 10514035 10167165 — 10288751 9,764203 — 9881145 — 9,950,673
САР ОРА 14652319 15332901 14710075 12109861 12299144 12633506 12815446
CIAPToal 65239 15332900 14710025 12109861 12299144 12,633,506 12,815,446
CIARDS CIARDS 292000 513700 51400 51400 514000 514000 514000
1.” 292,000 513,700 514,000 514,000 514,000 514,000 514,000
А ICMA 6261 547,891 540252 566850 578,665 597119 607,036
ПО RDT&E,AF 1399073 1322304 1136135 1,382639 1650208 — 1511045 1704716
СМА Tot — 2063394 870255 167638] 1949489 2228873 2108164 2311752
DHS P and Operations, 223,299 231,542 205,085 206,932 210,449 214,026 218,094
и" Secretary 29,150 28,100 28,146 28,397 28,883 29,374 29,928
Operating E xpenses 22,687 47,717 51,101 51,560 52,438 53,332 54,344
DHSToa 2546 30,350 284332 = 286889 29,770 296732 302,366
DO] Construction 105095 78982 78982 80326 81693 83081 84,577
“Salaries and Expenses, DEA 1358 1364 1413 14362 14605 1481 15118
Salaries and Expenses, ЕВ! 2,859,656 2,918,166 2,926,853 2,973,857 3,021,655 3,070,260 3,122,601
DOJ Total 29839 3010795 3019958 3,068,545 3117953 3168192 3,222,296
DoD-FCIP BRAC DAMA na n L ССС
ПОЕМА 9974 91616 110358 095410 98543 101470 102,431
O&M, AF 120,818 101244 95,040 84,986 88,193 91,329 92117
O&M,DW 159,996 170,114 179,886 151,252 156,524 164,933 165,868
O&M, MC 507 1,632 4,329 4,857 5,437 5,224 5,347
O&M,N 124,419 120,674 129,494 123,291 127,003 130,399 131,587
OP, A 413 423 434 441 449 457 466
OP,N = = 1,001 = = = =
P, MC = E 1,201 800 800 1,500 816
RDT&E, AF 2,109 2,149 2,185 2,221 2,258 2,296 2,342
RDT&E, DW 11,993 12,043 5,032 4,998 4,947 3,299 3,945
tel aa 517,720 505,895 528,960 468,256 484,154 501,616 504,919
Energy Other Defense Activities — 163,700 186,699 188619 188,619 188619 188619 188,619
EnergyTotal — 163700 186699 188619 188619 188,619 188619 188619
144 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 5 (continued) (Dollars in Thousands)
National Intelligence Program
Budget Authority by Program and Appropriation
FY 2011- ҒҮ 2017
This Exhibit is SEC RET//NOFORN
Program Appropriation FY 2011 FY 2012 FY 2013! FY 2014 FY 2015 FY 2016 FY 2017
GDIP — APAFE 1299 — 1650 2014 16921 1743 1208 0,303
——— BRAC 502 a Ge eee Ge
Fam Hsg O&M, DW 38,548 39,251 39,993 40,628 41,318 42,020 42,872
MilCon, AF 78,851 79,000 - - - - -
MilCon, DW 2,994 30,584 2,919 - - - -
O&M,A 260,679 259,869 218,177 200,632 192,443 195,603 198,911
O&M,AF 514,077 549,487 525,873 529,506 602,706 619,833 633,745
O&M,DW 3,090,315 3,109,351 2,976,404 2,281,670 2,329,035 2,365,332 2,403,146
O&M,MC - 38,561 35,658 33,738 33,046 33,542 34,062
O&M,N 406,086 352,233 338,887 345,820 348,602 354,775 360,840
ОР,А 2,908 2,975 1270 1291 1313 1,341 1368
ОР,АҒ 60,555 29,415 24,573 41,394 56,888 67,947 61,414
ОР,М 21,608 14,402 12,062 10,108 10,132 10,243 10,466
P,DW 46,072 39,035 24,991 37,258 24,771 20,846 21,20
Р,МС - - 479 446 410 415 423
RDT&E,A 3,928 4,023 4,099 4,163 4,235 4,306 4,393
RDT&E,AF 41,914 56,787 46,387 52,482 43,036 30,531 29,839
RDT&E,DW 120,085 121,636 107,383 96,022 95,992 96,345 96,701
RDT&E,N 60,458 72,472 50,823 51,131 53,612 54,211 55,342
GDIPTotal 4767009 4815583 4430142 3,743,280 3,855,000 3,909,308 3,963,945
NGP BRAC 15259 э -— = > -— —
^ — — MiConDW | | - 6388 -— №54
O&M,A 47,306 50,437 46,792 51,12 52,464 51,053 50,624
O&M,AF 72,629 82,585 82,508 82,706 82,247 78,570 74,225
O&M,DW 3,786,519 3,765,161 3,622,550 3,079,112 3,174,373 3,165,183 3,264,611
O&M,MC 1,859 4,720 6,976 7,441 7,901 7,281 7,336
O&M,N 8,141 8,280 7,601 8,059 8,535 8,413 8,567
ОР,А - 1,670 1731 1,822 1,948 2,088 2,130
P,DW 271,191 188,749 194,051 199,672 228,300 212,839 146,748
P,MC - 1,606 610 3,208 1292 901 908
RDT&E,A 496 513 529 543 560 560 571
RDT&E,AF 28,911 30,345 31,875 28,684 29,483 18,364 13,389
RDT&E,DW 876,100 841,328 883,191 809,324 907,295 931,652 768,304
RDT&E,N 496 506 516 523 531 531 542
NGPToal 5221,95 504,569 4878930 — 4272206 — 4494929 — 4537435 4,603,459
NRP A MsP,AF | 805106 768980 1097483 1378812 1,908564 1,662,508 1438311
| МАЕ 52831 4929: 51086 — 59253 6,019 6283 65,625
O&M,N 20,757 27,012 22,943 23,821 24,536 25,272 26,420
ОР,АҒ 2,279,991 2,338,408 2,269,031 2,299,888 2,491,919 2,630,320 2,719,955
RDT&E,AF 8,243,060 7,221,206 6,875,380 6,568,544 6,511,225 7,018,456 7,543,653
NRPTotal — 1140,74 1041335 10321923 10330322 10997263 11399388 11793964
SRP RDT&EN = 1466792 1261731 1133604 11372278 1218707 1248078 1,273,255
SRPTotl 1466792 1261731 113300 11372278 1218707 1248078 1273255
TOP SECRET//SI/TK//NOFORN 145
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 5 (continued) (Dollars in Thousands)
National Intelligence Program
Budget Authority by Program and Appropriation
FY 2011- ҒҮ 2017
This Exhibit is SECRET//NOFORN
Program Appropriation FY 2011 FY 2012 FY 2013! FY 2014 FY 2015 FY 2016 FY 2017
Diplomatic and Consular
State 68,773 68,203 72,655 73,981 75,373 76,798 78,249
Programs
State T otal 68,773 68,203 72,655 73,981 75,373 76,198 78,249
Treasury Salaries and Expênsês, 27,422 27,23 27,297 27,474 27,652 27,832 28,019
Treasury
Treasury 27,422 27,123 27,297 27,474 27,652 27,832 28,019
Total
National Intelligence Program T otal 54,639,507 53,873,203 52,554,597 48,458,951 49,557,642 50,490,813 51,550,962
1Еу 2013 - FY 2017 Total includes the ОСО only for FY 2013.
146 ТОР SECRET//SI/TK//NOFORN
Resource E xhibit No. 7B
National Intelligence Program
Comparison of FY 2012 Total and FY 2013 Total Request by Program
This Exhibit is SECRET//NOFORN
Program
Defense Appropriations
CCP
CIAP
CIARDS
CMA
DoD-FCIP
GDIP
NGP
NRP
SRP
Defense Appropriations T otal
Non-Defense A ppropriations
DHS
00)
Energy
State
Treasury
Non-Defense A ppropriations T otal
National Intelligence Program
Total
TOP SECRET//SI/TK//NOFORN
FY 2012
Total
10,514,035
15,332,901
513,700
1,870,255
505,895
4,815,583
5,041,569
10,411,335
1,267,751
50,273,024
307,359
3,010,795
186,699
68,203
27,123
3,600,179
53,873,203
ТОР SECRET//SI/TK//NOFORN
ЕҮ 2013
Base
Request
10,036,851
12,037,708
514,000
1,676,387
456,475
3,655,662
4,339,195
10,268,773
1,099,820
44,084,871
284,332
3,019,958
188,619
72,655
27,297
3,592,861
47,677,732
ҒҮ 2013
oco
Request
730,914
2,672,317
72,485
774,480
539,735
53,150
33,784
4,876,865
4,876,865
(Dollars in Thousands)
FY 2013
Total
Request
10,767,765
14,710,025
514,000
1,676,387
528,960
4,430,142
4,878,930
10,321,923
1,133,604
48,961,736
284,332
3,019,958
188,619
72,655
27,297
3,592,861
52,554,597
FY 2012 Total
Compared to
FY 2013 Total
Request
253,730
-622,876
300
-193,868
23,065
-385,441
-162,639
-89,412
-134,147
-1,311,288
-23,027
9,163
1,920
4,452
174
-7,318
-1,318,606
151
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 9 (Dollars in Thousands)
National Intelligence Program
Estimated Funding for Counterterrorism
FY 2011- ҒҮ 2013
This Exhibit is SECRET//NOFORN
FY 2012 - FY 2013 Change
FY 2011 FY 2012 FY 2013 FY 2013 FY 2013
Program Actual Enacted Base oco Request Funds Percent
САР — — 61796553 1073722 — 4473356 — 2205992 — 66793448 39434 56
CMA 121508 1175488 103794 — — 10794 A454 0
DHS... 183033 1547 - 164070 в (0
DO | 4,372,785 137838 136791 -— 138679 843 1
GDIP — — 1344200 12540 599789 408440 — 100829 242223 — 19
154 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 10 (Dollars in Thousands)
National Intelligence Program
Estimated Funding for Counterproliferation
FY 2011- ҒҮ 2013
This Exhibit is SECRET//NOFORN
FY 2012 - FY 2013 Change
FY 2011 FY 2012 FY 2013 FY 2013 FY 2013
Program Actual Enacted Base oco Request Funds Percent
САР О 1932216 2084133 2065665 6060 207134 12339 1
CMA 27218 21998 17767 м 321 46
DHS | 219 2250 -— 2235 оов 3
DO 38871 3334 3303 — -— 3303 31 0
GDIP 63450 651600 — 45913 60816 519955 -13163 20
Counterproliferation Total — 7,007,347 6,882010 6596737 88387 66851244 1968866 3
TOP SECRET//SI/TK//NOFORN 155
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 11 (Dollars in Thousands)
National Intelligence Program
Estimated Funding for H omeland Security With Related WM p!
FY 2011- ҒҮ 2013
This Exhibit is SECRET//NOFORN
FY 2012- FY 2013 Change
FY 2011 FY 2012 FY 2013 FY 2013 FY 2013
Description Program Actual Enacted Base oco Request Funds Percent
CIAP 36,492 39,314 39,625 — 39,625 311 1
СМА 335,798 301,108 325,186 - 325,186 24,078 8
DHS 212,186 300,624 273,758 — 273,758 -26,866 -9
DoD-FCIP 14,867 14,765 14,553 - 14,553 -212 -1
Doj 2,592,144 2,807,474 2,831,971 - 2,831,971 24,497 1
Energy 73,158 73,853 73,795 - 13,795 -58 0
GDIP 22,841 6,752 6,719 — 6,719 -33 0
NGP 170,837 165,759 121,244 — 121,244 -44,515 -27
NRP 7,545 7,001 6,070 — 6,070 -931 -13
SRP 25,949 20,826 18,799 — 18,799 -2,027 -10
State 401 401 406 - 406 5 1
Treasury 27,422 27,123 27,296 - 27,296 173 1
Homeland Security Total 3937,844 4147225 413377 1154 41341 54 41
TT Security - Related DHS 5 689 691 _ 691 2 0
DoJ 76,318 76,556 76,970 E 76,970 414 1
Energy 18,895 17,579 17,579 — 17,579 - =
PM eve 95,213 94,824 95,240 = 95,240 416 1
NIP Homeland Security with Related 4,033,057 — 4,242,049 4228957 174 4230711 -11,338 E
Weapons of Mass Destruction T otal
1D efinition of Homeland Security from OM B Circular A -11.
156 TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 12 (Dollars in Thousands)
National Intelligence Program
Estimated Funding for Counternarcotics
FY 2011- ҒҮ 2013
This Exhibit is SECRET//NOFORN
FY 2012 - FY 2013 Change
FY 2011 FY 2012 FY 2013 FY 2013 FY 2013
Program Actual Enacted Base oco Request Funds Percent
САР — 519033 57439 4845 20 4667 2725 20
CMA MS 118 м — - 4415 2⁄3 46
DO 1358 D пыз - 102 46 3
GDP — 2 ж 934A - 9 6 4
NRP —— 30532 26260] 2532 50 259982 -535 2
State — 75 70 70 | - 170 239 3
Treasury 39 3100 32 - 3s d 7
CounternarcoticsTotal 1,408,700 — 1462376 1,245,320 780 124600 -116276 59
TOP SECRET//SI/TK//NOFORN 157
Resource E xhibit No. 13
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program
CCP
158
Expenditure C enter
Analysis
Analysis T otal
Analysis Enabling
Analysis E nabling T otal
Computer N etwork Operations
Computer Network Operations T otal
Cryptanalysis & Exploitation Services
Cryptanalysis & Exploitation Services
Total
Enterprise IT Systems
Enterprise ІТ Systems Т otal
Enterprise M anagement
TOP SECRET//SI/TK//NOFORN
(Dollars in Thousands)
FY 2012-
FY 2013
Project FY 2011 FY 2012 FY 2013 Change
Analytic Integrity & Standards 32,962 34,635 39,752 5,117
Cyber 164,090 145,981 138,639 -7,342
Military Forces & W eapons A nalysis 98,983 92,199 80,817 -11,382
Regional 191,839 221,812 207,302 -20,510
Transnational 159,521 160,573 188,132 21,559
647,395 661,200 654,642 -6,558
Analytic Operational Support 171,484 175,530 179,561 4,031
Analytics М odernization 423,831 512,479 427,449 -85,030
Linguists/T ransl ators 228,123 226,820 217,504 -9,316
823,438 914,829 824,514 -90,315
Data A cquisition and Cover Support 56,949 100,987 117,605 16,618
GENIE 615,177 636,175 651,743 15,568
SIGINT Enabling 298,613 275,376 254,943 -20,433
970,739 1,012,538 1,024,291 11,753
Analysis of Target Systems 39,429 35,128 34,321 -807
Cryptanalytic ІТ Systems 130,012 136,797 247121 110,324
Cyber Cryptanalysis 181,834 110,673 115,300 4,627
Exploitation Solutions 90,024 59,915 58,308 -1,607
M icroelectronics 64,603 61,672 45,886 -15,786
PEO Program 37,683 65,892 47,185 -18,707
PEO Program B 132,500 39471 18,000 -21471
PEO Program C 83,599 242,945 360,898 117,953
Target Pursuit 15,686 70,144 76,168 6,024
Target Reconnaissance & Survey 77,668 74,513 — -74,513
913,038 897,150 1,003,187 106,037
Connectivity 407,592 366,995 363,554 -3,441
4... SENG 157,110 237,420 225,780 -11,862
Enterprise A rchitecture & Planning 18,233 11,801 16,467 4,666
Information A ssurance 141,190 174,659 139,893 -34,766
M anagement & Support 79,199 92,200 93,395 1,195
Platforms 713,633 729,336 750,215 20,879
1,577,557 1,612,633 1,589,304 -23,329
Acquisition M anagement 111,495 110,325 116,699 6,374
СООР 6,702 6,633 7,015 382
Corporate Support - 60,599 65,515 4,916
Education & Training 227,968 244,249 232,999 -11,250
Entitlements Reimbursement 2,089 1,805 1,805 —
Finance 108,355 95,415 110,879 15,464
Foreign Relations & Liaison 23,312 24,328 20,868 -3,460
HQ Management 139,033 111,151 115,822 4,671
Human Resources 128,380 125,757 127,313 1,556
Military HQ M anagement 74,349 73,346 69,982 -3,364
TOP SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program Expenditure C enter Project
Security
Systems Engineering: SIGINT
Enterprise M anagement T otal
Facilities & Logistics Facilities
Logistics
Facilities & Logistics T otal
Mid Point RF Access FORNSAT
Quick Reaction Capabilities
RF Operations
Tailored RF Solutions
Terrestrial Collection
Mid Point RF Access Total
Mission M anagement / T asking Collection M anagement
Customer Service
Foreign Partner Operations
Journeyman
M ission M anagement M odernization
Mission M anagement / T asking T otal
Mission Processing & Exploitation ELINT M odernization
FISINT M odernization
Net-centric Capabilities
Mission Processing & E xploitation
Total
Computer & Information Science
Research
Coping with Information Overload
Cryptologic M ath & IDA Research
Human Language T echnology Research
Improving Research Operations
Owning the Net
Penetrating Hard Targets
Ubiquitous Secure Collaboration
Research & Technology
Research & Technology T otal
Sensitive T echnical Collection CLANSIG
SCS
Sensitive T echnical Collection T otal
SIGINT Stations Cryptologic Centers
Field Sites
OCMC
SIGINT Ground Operations
SIGINT Stations T otal
Special Source A ccess Corporate Partner A ccess
Foreign Partner A ccess
TOP SECRET//SI/TK//NOFORN
FY 2011
255,787
97,938
1,175,408
1,490,711
105,409
1,596,120
136,710
40,136
103,985
90,978
371,809
76,193
149,188
74,146
13,357
29,139
342,623
75,999
9,725
292,217
377,941
20,777
39,046
146,432
26,361
37,181
66,933
62,783
14,651
414,164
346,961
269,708
616,669
29,299
191,128
6,166
71,912
298,505
393,667
90,979
(Dollars in Thousands)
FY 2012
266,175
110,075
1,229,858
1,199,825
107,464
1,307,289
108,385
45,957
65,538
84,302
304,182
113,924
173,186
71,642
13,206
22,220
394,178
40,923
34,196
281,552
356,671
44,254
64,332
128,511
34,030
30,503
61,167
55,347
25,762
443,906
325,506
245,829
571,335
30,602
184,643
6,416
62,008
283,669
310,234
75,108
FY 2013
269,790
85,984
1,224,671
1,514,217
102,501
1,616,718
81,330
98,922
131,276
69,090
380,618
125,896
158,473
67,287
12,986
22,333
386,975
55,706
29,510
219,583
304,799
29,579
48,612
119,300
29,357
31,195
67,589
79,740
23,741
429,113
348,196
249,088
597,284
24,588
185,917
7,165
50,519
268,189
278,131
56,593
FY 2012 -
ЕУ 2013
Change
3,615
-24,091
-5,187
314,392
-4,963
309,429
-27,055
-45,957
33,384
131,276
-15,212
76,436
11,972
-14,713
-4,355
-220
113
-7,203
14,783
-4,686
-61,969
-51,872
-14,675
-15,720
-9,211
-4,673
692
6,422
24,393
-2,021
-14,793
22,690
3,259
25,949
-6,014
1274
749
-11,489
-15,480
-32,103
-18,515
159
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program
CCP Total
CIAP
160
Expenditure C enter
Special Source Access T otal
Analysis
Analysis T otal
Analysis Enabling
Analysis E nabling T otal
Computer N etwork Operations
Computer Network Operations T otal
Counterintelligence
Counterintelligence T otal
Covert Action
Covert Action Total
Enterprise ІТ Systems
Enterprise ІТ Systems T otal
Enterprise M anagement
Enterprise M anagement T otal
TOP SECRET//SI/TK//NOFORN
Project
National Program
Special Source Operations
Analytic Integrity & Standards
CI
Regional
Transnational
Education & Training
Mission IT
M ission Support
Production and Dissemination
Education & Training
Information Operations
Mission IT
CI Operations
Education & Training
Mission Activities and Support
Mission IT
Covert A ction Infrastructure
Covert A ction Programs
Connectivity
Data Handling & End-U ser
Functionality
Education & Training
Enterprise A rchitecture & Planning
Information A ssurance
M anagement & Support
Platforms
Acquisition M anagement
COOP
Corporate Support
Education & Training
Finance
HQ M anagement
Human Resources
Inspector General
Security
TOP SECRET//SI/TK//NOFORN
FY 2011
177
125,340
611,757
10,737,163
5,729
14,301
214,891
456,005
690,926
39,333
239,295
81,360
22,564
382,552
4,209
637,295
7,830
649,334
125,942
4,779
15,785
2,178
148,684
600,696
2,011,811
2,612,507
85,795
35,004
9,566
8,252
768
256,750
126,993
523,128
22,284
9,401
113,139
104,253
52,198
153,774
184,854
242,078
881,981
(Dollars іп Thousands)
FY 2012
2,038
137,217
524,597
10,514,035
6,063
14,515
210,477
456,887
687,942
40,797
257,685
91,377
25,046
414,905
2,245
652,559
9,443
664,247
141,669
5,892
14,497
2,189
164,247
542,075
1,970,933
2,513,008
67,225
56,120
9,782
8,619
12,736
219,083
138,301
571,866
33,149
8,748
129,224
110,671
51,810
115,838
190,959
32,716
224,078
897,253
FY 2013
2,247
126,489
463,460
10,767,765
5,872
14,586
209,161
434,248
663,867
37,335
252,862
99,937
34,488
424,622
2,250
673,399
9,726
685,375
140,061
4,257
11,784
2,096
158,198
523,402
2,036,006
2,559,408
70,878
42,839
10,267
15,306
6,328
249,467
133,940
529,025
26,262
6,188
148,737
101,423
57,853
113,833
186,051
34,796
224,265
899,408
ЕҮ 2012-
FY 2013
Сһапде
209
-10,728
-61,137
253,730
-191
71
-1,316
-22,639
-24,075
-3,462
-4,823
8,560
9,442
9,717
5
20,840
283
21,128
-1,608
-1,635
-2,713
-93
-6,049
-18,673
65,073
46,400
3,653
-13,281
485
6,687
-6,408
-29,616
-4,361
-42,841
-6,887
-2,560
19,513
-9,248
6,043
-2,005
-4,908
2,020
187
2,155
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program
CIAP Total
CIARDS
Expenditure C enter
Facilities & Logistics
Facilities & Logistics T otal
HUMINT Enabling
HUMINT Enabling Total
HUMINT Operations
HUMINT Operations T otal
HUMINT Technical Tools
HUMINT Technical Tools T otal
Mission M anagement / T asking
Mission M anagement / T asking T otal
Open Source
Open Source T otal
Research & Technology
Research & Technology T otal
Reserve for Contingencies
Reserve for C ontingencies T otal
Sensitive T echnical Collection
Sensitive T echnical C ollection T otal
Enterprise M anagement
Enterprise M anagement T otal
CIARDS Total
TOP SECRET//SI/TK//NOFORN
Project
Facilities
Logistics
Cover Services
Education & Training
Mission IT
M ission Support
H eadquarters
Non-Traditional
Traditional
Education & Training
M ission IT
Special Activities and Platforms
Tactical Collection
Technical Tradecraft
Mission IT
National Clandestine Service
Community
Collection & Production
Education & Training
Mission IT
Science and Research
Strategic Technical Investment
Reserve
Clandestine Technical Collection
Clandestine W eapons T echnical
Collection
CLANSIG
Education & Training
SCS
Support to National Programs
Human Resources
TOP SECRET//SI/TK//NOFORN
FY 2011
147,049
18,046
165,095
51,165
156,778
794,985
1,376,353
2,385,881
19,268
456,491
1,737,389
2,213,148
8,488
6,619
373,212
486,824
458,790
1,333,933
4,646
8,282
12,928
245,531
10,921
153,126
409,578
85,315
61,862
147,177
15,000
15,000
1,208,948
239,093
446,216
13,889
95,006
71,315
2,080,527
14,652,379
292,000
292,000
292,000
(Dollars in Thousands)
FY 2012-
FY 2013
FY 2012 FY 2013 Change
251,686 154231 -97,455
18,472 17,347 -1,125
270,158 171,578 -98,580
67,360 68,656 1,296
162,967 169,166 6,199
815,727 814,815 -912
1,527,520 1,476,607 -50,913
2,573,574 2,529,244 -44,330
18,918 19,119 201
453,143 466,137 12,994
1,815,936 1,858,423 42,487
2,287,997 2,343,679 55,682
10,606 11,167 561
7,844 6,358 -1,486
368,215 356,571 -11,644
479,919 495,957 16,038
500,370 543,333 42,963
1,366,954 1,413,386 46,432
7,938 3,531 -4,407
9,252 1,373 -1,879
17,190 10,904 -6,286
260,126 253,068 -7,058
12,678 12,652 -26
111,136 121,627 10,491
383,940 387,347 3,407
87,310 76,763 -10,547
52,640 50,198 -2,442
139,950 126,961 -12,989
20,000 35,000 15,000
20,000 35,000 15,000
1,431,227 837,755 -593,472
247,072 266,429 19,357
467,900 464,625 -3,275
15,269 21,574 6,305
121,537 105,758 -15,779
76,665 75,882 -783
2,359,670 1,772,023 -587,647
15,332,901 14,710,025 -622,876
513,700 514,000 300
513,700 514,000 300
513,700 514,000 300
161
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 13 (continued) (Dollars in Thousands)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
FY 2011- ҒҮ 2013
This Exhibit is SECRET//NOFORN
FY 2012-
FY 2013
Program Expenditure C enter Project FY 2011 FY 2012 FY 2013 Change
CMA Analysis IntelligenceToday _ _ 200 | - - -—
President's Daily Briefing Staff 7,969 8,017 8,488 471
Analysis T otal 65,966 58,429 51,440 -6,989
Enterprise IT Systems Chief Information Office 175,796 73,791 142,509 68,718
Information Integration 127,906 98,281 — -98,281
и Information Sharing 21751 23,036 25,884 2,848
Enterprise ІТ Systems T otal 325,453 195,108 168,393 -26,715
Enterprise M anagement Acquisition and Technology 43,888 34,385 32,212 -2,173
Analysis 50,275 — — —
Chief Financial Office 16,734 24,690 30,582 5,892
Chief Human Capital Officer 54,885 35,434 — -35,434
Collection 39,797 - - -
COOP 70,862 72,552 57,817 -14,735
Director of National Intelligence 105,594 65,944 39,463 -26,481
Education & Training 84,068 89,492 E -89,492
Human Capital and L earning - - 103,903 103,903
Inspector General - 5,381 6,901 1,520
Mission Support Center 241,914 310,762 241,186 -69,576
Policy and Outreach M anagement - 17,105 22,800 5,695
Policy Plans and Requirements 18,758 — — —
Security 36,497 34,508 33,302 -1,206
Systems and Resource A nalysis 26,328 26,946 28,913 1,967
Enterprise M anagement T otal 789,600 717,199 597,079 -120,120
Mission M anagement / T asking Community CI 56,944 61,980 46,888 -15,092
ission M anagers 8,515 — — —
2. Intelligence Coordination 12671 _ _ _
National Intelligence Integration - 95,989 85,469 -10,520
СРС 60,627 40,606 22,461 -18,145
CTE 316,700 368,373 371,578 3,205
Mission M anagement / T asking T otal 515,457 566,948 526,396 -40,552
Research & Technology 2. DAT "ih 350,978 327,349 333,079 5,730
ational R&D Commission 2,000 - - -
Rapid Technology Transition Initiative 13,940 5,222 — -5,222
Research & Technology T otal 366,918 332,571 333,079 508
МА 2,063,394 1,870255 1676387 -193868
DHS Analysis HomeandSeurty 223,299 2300804 19343 3174
Analysis T otal 245,986 277,801 233,561 -44,240
Counterintelligence DHS Counterintelligence - - 12,742 12,742
USCG Counterintelli gence - - 9,883 9,883
Counterintelligence Т otal - - 22,625 22,625
162 ТОР SECRET//SI/TK//NOFORN
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
(Dollars in Thousands)
This Exhibit isSECRET//NOFORN
FY 2012 -
FY 2013
Program Expenditure C enter Project FY 2011 FY 2012 FY 2013 Change
Enterprise M anagement COOP - 1458 - -1,458
Security 29,150 28,100 28,146 46
Enterprise M anagement T otal 29,150 29,558 28,146 -1412
DHS Total 275,136 307,359 284,332 -23,027
DoD-FCIP Analysis CI 34,283 37,974 38,162 188
Analysis T otal 34,283 37,974 38,162 188
Counterintelligence СІ Campaigns 15,625 67,937 60,750 -7,187
СІ Operations 21,336 23,678 34,116 10,438
Defense Cyber Crime Center 15,459 17,935 19,328 1,393
Education & Training 39,072 37,821 36,159 -1,662
Joint Terrorism Task Force 14,867 14,765 14,553 -212
Mission Activities and Support 233,254 216,835 223,734 6,899
Mission IT 38,354 37,322 36,364 -958
Research & Technology Protection 6,424 6,454 20,513 14,059
Counterintelligence T otal 444,391 422,747 445,517 22,770
Enterprise ІТ Systems Platforms 12,774 15,578 16,183 605
Enterprise ІТ Systems T otal 12,774 15,578 16,183 605
Enterprise M anagement HQ M anagement 24,199 21,382 20,613 -769
Human Resources 2,052 1,906 2,003 97
Enterprise M anagement T otal 26,251 23,288 22,616 -672
Facilities & Logistics Facilities 21 6,308 6,482 174
Facilities & Logistics T otal 21 6,308 6,482 174
DoD-FCIP Total 517,720 505,895 528,960 23,065
00) Analysis Computer Intrusions 114,083 116,434 — -116,434
Transnational 759,564 771,582 849,037 77,455
Analysis T otal 873,647 888,016 849,037 -38,979
Analysis Enabling Linguists/T ranslators 147,022 148,427 149,263 836
Analysis E nabling T otal 147,022 148,427 149,263 836
Counterintelligence CI Operations 562,345 367,383 489,821 122,438
Counterintelligence T otal 562,345 367,383 489,821 122,438
Enterprise IT Systems Platforms 54,670 40,960 40,034 -926
Enterprise ІТ Systems T otal 54,670 40,960 40,034 -926
Enterprise M anagement Education & Training 41,029 46,429 45,945 -484
HQ Management 471,434 520,945 25,038 -495,907
Enterprise M anagement T otal 512,463 567,374 70,983 -496,391
Facilities & Logistics Facilities 60,311 43,480 43,256 -224
Facilities & Logistics T otal 60,311 43,480 43,256 -224
HUMINT Operations Traditional 471,449 663,226 919,798 256,572
HUMINT Operations T otal 471,449 663,226 919,798 256,572
Technical Operations Computer Intrusions - - 168,146 168,146
Technical Services 296,422 291,929 289,620 -2,309
Technical O perations T otal 296,422 291,929 457,766 165,837
DOJ Total 2,978,329 3,010,795 3,019,958 9,163
Energy Analysis Transnational 105,862 126,288 142,7 16,483
Analysis T otal 105,862 126,288 142,771 16,483
TOP SECRET//SI/TK/NOFORN 163
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit isSECRET//NOFORN
Program
Energy T otal
GDIP
164
Expenditure C enter
Counterintelligence
Counterintelligence T otal
Analysis
Analysis T otal
Analysis Enabling
Analysis E nabling T otal
Enterprise IT Systems
Enterprise ІТ Systems T otal
Enterprise M anagement
Enterprise M anagement T otal
Facilities & Logistics
Facilities & Logistics T otal
HUMINT Enabling
HUMINT Enabling Total
HUMINT Operations
HUMINT Operations T otal
MASINT
TOP SECRET//SI/TK//NOFORN
Project
CI Operations
Analytic Integrity & Standards
С415К Analysis
M edical
Military Forces & W eapons A nalysis
Regional
S&T Analysis
Transnational
Warning
Analytic Tools
Education & Training
M ission Support
Connectivity
Enterprise A rchitecture & Planning
Information A ssurance
M anagement & Support
Platforms
Acquisition M anagement
COOP
Education & Training
Finance
Foreign Relations & Liaison
HQ Management
Human Resources
Security
Facilities
L ogistics
Cover Services
Education & Training
Mission IT
M ission Support
Non-Traditional
Special M ission Unit
Traditional
Close A ccess/Persistent Surveillance
Directed Energy W eapons
Education & Training
TOP SECRET//SI/TK//NOFORN
FY 2011
57,838
57,838
163,700
1,081
98,071
19,791
136,704
164,595
303,337
228,118
15,319
967,016
86,927
12,423
72,624
171,974
253,578
40,793
22,943
189,018
458,876
965,208
16,755
4,683
62,849
60,478
9232
52,128
59,347
86,005
351,477
287,110
164,068
451,178
30,453
50,450
19,679
258,833
359,415
208,226
76,180
109,835
394,241
41,265
6,263
1,942
(Dollars in Thousands)
FY 2012-
FY 2013
FY 2012 FY 2013 Change
60,411 45,848 -14,563
60,411 45,848 -14,563
186,699 188,619 1,920
1,592 - -1,592
100,670 133,051 32,381
21,689 20,218 -1471
126,135 127,647 1512
170,533 154,064 -16,469
273,389 272,155 -1,234
247,175 210,191 -36,984
17,725 17,370 -355
958,908 934,696 -24,212
130,671 154,132 23,461
14,292 19,654 5,362
83,894 74,228 -9,666
228,857 248,014 19,157
246,141 212,087 -34,054
44,046 44,594 548
42,238 44,184 1,946
169,135 147,293 -21,842
428,516 385,254 -43,262
930,076 833,412 -96,664
18,590 18,594 4
4,926 5,438 512
66,190 74,278 8,088
66,589 74,315 7,126
10,316 - -10,316
53,609 52,095 -1,514
52,720 68,170 15,450
87,659 108,791 21,132
360,599 401,681 41,082
311,386 181,221 -130,165
126,974 93,699 -33,275
438,360 274,920 -163,440
32,460 41,932 9,472
45,519 46,034 515
8,490 8,936 446
303,126 310,263 7,137
389,595 407,165 17,570
214,606 175,599 -39,007
72,683 — -72,683
114,395 129,037 14,642
401,684 304,636 -97,048
42,523 31,961 -10,562
6,369 6,417 48
1,996 2,035 39
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program
GDIP Total
NGP
Expenditure C enter
MASINT Total
Mission M anagement / T asking
Mission M anagement / T asking T otal
Open Source
Open Source T otal
Research & Technology
Research & Technology T otal
Sensitive T echnical Collection
Sensitive T echnical C ollection T otal
Analysis
Analysis T otal
Commercial Remote Sensing
Commercial R emote Sensing T otal
Enterprise IT Systems
Enterprise ІТ Systems T otal
Enterprise M anagement
TOP SECRET//SI/TK//NOFORN
Project
Missiles
Mission IT
Mission Support
National Signatures Program
WMD
Collection M anagement
Foreign Relations & Liaison
ission M anagement C enters
edia Exploitation and Open Source
ission IT
Analysis Development
T Technology Insertion
ASINT Technology Development &
Demonstration
aritime Surveillance
AGI Analysis
Analytic Integrity & Standards
Deployed Operations
Homeland Security
Integrated O perations Center - Special
Projects (IOC-SP)
International Operations
Regional
Transnational
Warning
M ission Support
Purchases
Connectivity
Data Handling & End-U ser
Functionality
Information A ssurance
M anagement & Support
Platforms
Systems M aintenance
Acquisition M anagement
COOP
Education & Training
TOP SECRET//SI/TK//NOFORN
FY 2011
201,268
6,930
37,654
10,930
268,164
574,416
34,115
31,466
66,241
238,768
13,611
252,379
6,840
28,951
90,292
126,083
87,381
87,381
4,767,009
115,731
601
75,611
41,060
81,502
31,291
331,943
328,597
42,909
1,115,245
15,956
220,718
236,674
164,499
212,535
46,490
50,594
49,728
374,975
898,821
42,003
7,166
88,052
(Dollars in Thousands)
FY 2012-
FY 2013
FY 2012 FY 2013 Change
224,609 171,822 -52,787
6,905 8,712 1,807
47,113 38,208 -8,905
6,463 1,270 -5,193
285,611 275,425 -10,186
621,589 535,850 -85,739
49,873 63,573 13,700
- 10,147 10,147
49,873 73,720 23,847
212,548 210,685 -1,863
17,604 16,893 -711
230,152 227,578 -2,574
5,904 4,659 -1,245
21,909 12,372 -9,537
87,441 83,260 -4,181
115,254 100,291 -14,963
90,636 88,179 -2,457
90,636 88,179 -2,457
4,815,583 4,430,142 -385,441
178,199 172,741 -5,458
554 580 26
88,723 101,935 13,212
47,139 16,439 -30,700
83,464 86,180 2,716
40,677 - -40,677
336,689 269,649 -67,040
318,580 287,344 -31,236
42,310 37,887 -4,423
1,136,335 972,755 -163,580
15,251 - -15,251
205,670 - -205,670
220,921 - -220,921
179,223 184,835 5,612
213,359 186,702 -26,657
46,375 42,365 -4,010
85,521 94,056 8,535
66,141 78,485 12,344
454,458 429,214 -25,244
1,045,077 1,015,657 -29,420
39,937 38,142 -1,795
6,062 6,053 -9
15,835 78,985 3,150
165
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program
NGP Total
NRP
166
Expenditure C enter
Enterprise M anagement T otal
Facilities & Logistics
Facilities & Logistics T otal
GEOINT Data
GEOINT Data Total
Mission M anagement / T asking
Mission M anagement / T asking T otal
Mission Processing & Exploitation
Mission Processing & E xploitation
Total
Research & Technology
Research & Technology T otal
Enterprise IT Systems
Enterprise ІТ Systems Т otal
Enterprise M anagement
TOP SECRET//SI/TK//NOFORN
Project
Finance
GEOINT Functional M anagement
HQ M anagement
Human Resources
Security
Facilities
Logistics
Commercial Imagery
Source Assessment & ERM
GEOINT Functional M anagement
International Operations
M ission Readiness
Source A ssessment & ERM
Source Tasking Operations &
M anagement
Compartmented GEOINT Enterprise
Services (CGES)
NSG Enterprise M odernization
NSG Integrated A rchitecture Services
NSG Operational Systems
NSG Sensor Integration
NSG Systems Engineering
STIL
Advanced Radar GEOINT
GEOINT Advanced Technology
Development
GEOINT Basic & Applied Research
GEOINT Research and Technology
Enablers
Connectivity
Enterprise Architecture & Planning
Information A ssurance
Acquisition M anagement
COOP
Education & Training
Finance
HQ Management
Human Resources
TOP SECRET//SI/TK//NOFORN
FY 2011
44,988
24,074
54,788
46,966
143,161
451,198
516,506
2,632
519,138
17,227
364,828
117,364
499,419
69,539
261,759
119,781
446,191
146,665
220,717
22,817
1,287,469
7,105
85,550
70,631
56,695
219,981
5,227,945
545,666
22,710
18,118
586,494
38,641
7,545
2,612
18,202
46,261
219,727
(Dollars in Thousands)
FY 2012 -
FY 2013
FY 2012 FY 2013 Change
61,809 50,159 -11,650
21,841 - -21,841
45,778 48,032 2,254
41,118 43,340 2,222
123,726 147,391 23,665
416,106 412,102 -4,004
219,792 112,716 -107,076
2,902 2,754 -148
222,694 115,470 -107,224
- 189,744 189,744
- 347,335 347,335
- 537,079 537,079
- 23,406 23,406
- 37,657 37,657
15,348 11,107 -4,241
330,725 - -330,725
148,201 120,802 -27,399
494,274 192,972 -301,302
92,148 68,499 -23,649
202,416 218,695 16,279
185,238 213,519 28,281
415,591 516,352 100,761
138,948 133,328 -5,620
215,872 222,910 7,038
34,484 42,648 8,164
1,284,697 1,415,951 131,254
93,341 94,405 1,064
74,867 70,591 -4,276
53,257 51,948 -1,309
221,465 216,944 -4,521
5,041,569 4,878,930 -162,639
456,333 486,588 30,255
36,653 36,215 -438
18,042 13,264 -4,778
511,028 536,067 25,039
28,831 26,114 -2,717
7,001 6,070 -931
1,646 1,524 -122
18,648 19,794 1,146
42,834 37,043 -5,791
226,992 233,560 6,568
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
ЕУ 2011- FY 2013
This Exhibit is SEC RET//NOFORN
Program
Expenditure C enter
Enterprise M anagement T otal
Facilities & Logistics
Facilities & Logistics T otal
GEOINT EO
GEOINT EO Total
GEOINT Radar
GEOINT Radar T otal
GEOINT/SIGINT Integrated
Ground Development Engineering &
M anagement
GEOINT/SIGINT Integrated
Ground Development E ngineering &
Management T otal
Launch
Launch T otal
Mission Ground Stations
Mission Ground Stations T otal
Research & Technology
Research & Technology T otal
Sensitive T echnical Collection
Sensitive T echnical C ollection T otal
SIGINT High
TOP SECRET//SI/TK//NOFORN
Project
NRO Mission Support
Security
Spectrum M anagement
Systems Engineering
Facilities
Logistics
Enhanced Imagery System
EO Integration & Support
Evolved Enhanced CRY STAL System
GEOINT Radar Sustainment
Radar Integration & Support
TOPAZ (1-5)
TOPAZ Block 2
Command & Control
Ground Integration & Support
Mission Control
M ission Framework
M ission M anagement
M ission Processing
Launch Capability Infrastructure
Launch Operations & Engineering
Launch V ehicles
CONUS Operations
OCONUS Operations
Station Integration & Support
Research & Technology Development
Research & Technology Support
NRO Compartmented Programs
High Altitude Integration & Support
NEMESIS 2
ORION 7
ORION 8
RAVEN 5/6
TOP SECRET//SI/TK//NOFORN
FY 2011
60,739
81,499
7,931
131,492
614,649
98,964
49,840
148,804
1,527,603
45,094
1,572,697
82,493
594,020
676,513
246,469
212,455
268,307
175,776
648,756
1,551,763
282,051
288,344
330,092
900,487
792,345
271,709
42,288
1,106,342
352,634
11,333
363,967
653,027
653,027
127,402
502,433
9,130
182,277
(Dollars in Thousands)
FY 2012
45,050
94,393
7,922
153,980
627,297
169,761
46,229
215,990
225,101
30,478
1,246,345
1,501,924
10,000
123,264
429,823
563,087
179,965
204,316
351,013
149,761
559,002
1,444,057
269,500
303,301
377,771
950,572
804,687
280,233
41,121
1,126,041
353,665
7,365
361,030
750,955
750,955
126,674
130,383
FY 2013
88,312
86,481
8,280
137,970
645,148
165,382
54,476
219,858
186,701
91,235
1,549,148
1,827,084
85,785
67,686
124,789
278,260
54,850
183,199
362,173
198,814
35,913
638,850
1,473,799
286,000
295,414
679,073
1,260,487
700,673
276,593
31,684
1,008,950
391,110
10,250
401,360
482,027
482,027
105,152
37,967
FY 2012 -
ЕУ 2013
Сһапде
43,262
-7,912
358
-16,010
17,851
-4,379
8,247
3,868
-38,400
60,757
302,803
325,160
-10,000
-37,479
-362,137
124,789
-284,827
-125,115
-21,117
362,173
-152,199
-113,848
79,848
29,742
16,500
-7,887
301,302
309,915
-104,014
-3,640
-9,437
-117,091
37,445
2,885
40,330
-268,928
-268,928
-21,522
-92,416
167
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
FY 2011- ҒҮ 2013
This Exhibit is SECRET//NOFORN
Program
NRP Total
SRP
SRP Total
State
State T otal
Treasury
168
Expenditure C enter
SIGINT High Total
SIGINT Low
SIGINT Low Total
Space Communications
Space Communications T otal
Enterprise M anagement
Enterprise M anagement T otal
Research & Technology
Research & Technology T otal
Sensitive T echnical Collection
Sensitive T echnical Collection T otal
Special Source A ccess
Special Source Access T otal
Analysis
Analysis T otal
Analysis Enabling
Analysis E nabling T otal
Enterprise ІТ Systems
Enterprise ІТ Systems T otal
Analysis
Analysis T otal
TOP SECRET//SI/TK//NOFORN
Project
SIGINT High Altitude В eplenishment
Program (SHARP)
INTRUDER 11/12
INTRUDER 5/6
INTRUDER 7/8
Low Altitude Integration & Support
Mission System Encryption
QUASAR R/S - 17/18
QUASAR R/S - 19
QUASAR R/S 20/21
QUASAR R/S 22/23
Relay Readiness and Launch
Space Communications Integration &
Support
Space Operations Development
Segment
(Project P_ MA)
COOP
(Project P_APP)
Project P_GBG)
Project P_O_ST)
Project P_RUSH)
Project P_SRC)
Project P_AC)
Project P_CCBS)
Project P_O_SA)
Project P_SCOL)
Analytic Integrity & Standards
Transnational
Mission Support
M anagement & Support
Transnational
TOP SECRET//SI/TK//NOFORN
FY 2011
948,443
1,769,685
231,484
489,969
122,197
843,650
26,425
26,143
7,223
252,337
80,264
91,351
129,924
613,667
11,401,745
31,955
3441
35,396
81,255
81,255
109,463
95,625
198,086
129,486
532,660
424,291
24,978
51,727
316,485
817,481
1,466,792
143
44,715
44,858
13,299
13,299
10,616
10,616
68,773
22,568
22,568
(Dollars in Thousands)
FY 2012
832,977
1,090,034
112,570
439,948
113,563
666,081
29,174
263,603
21,573
42,216
78,791
161,882
603,239
10,411,335
28,326
500
28,826
65,330
65,330
123,712
107,695
195,263
90,695
517,365
329,096
48,480
218,654
656,230
1,267,751
143
44,552
44,695
13,241
13,241
10,267
10,267
68,203
22,569
22,569
FY 2013
784,338
927,457
323,427
122,932
446,359
30,073
435,300
80,781
16,919
99,914
152,080
815,067
10,321,923
28,682
500
29,182
56,377
56,377
119,918
103,258
197,312
90,159
510,647
239,779
49,357
248,262
537,398
1,133,604
144
44,968
45,112
13,930
13,930
13,613
13,613
72,655
22,143
22,743
FY 2012-
FY 2013
Change
-48,639
-162,577
-112,570
-116,521
9,369
-219,722
899
171,697
53,208
-25,297
21,123
-9,802
211,828
-89,412
356
877
-30,392
-118,832
-134,147
1
416
417
689
689
3,346
3,346
4,452
174
174
TOP SECRET//SI/TK//NOFORN
Resource E xhibit No. 13 (continued)
National Intelligence Program
Budget Authority by Program, Expenditure C enter, and Project
FY 2011- ҒҮ 2013
(Dollars in Thousands)
This Exhibit is SECRET//NOFORN
FY 2011
FY 2012
FY 2013
FY 2012-
FY 2013
Program Expenditure C enter Project
Enterprise IT Systems Platforms
Enterprise ІТ Systems T otal
Treasury T otal
4,854
4,854
27,422
4,554
4,554
27,123
4,554
4,554
27,297
Сһапде
174
National Intelligence Program Т otal
TOP SECRET//SI/TK//NOFORN
54,639,507
53,873,203
52,554,597
-1,318,606
169
«See rs.
354 / 569 338 / 340 354 / 570
539 / 569
21 Bokstaveringsalfabetet (Svenska)
Adam
Bertil
Cesar
David
Erik
Filip
Gustav
Helge
Туаг
Johan
Kalle
Ludvig
Martin
Niklas
Q: >: > N < x Z < C —= Q mx O — O
Olof
Petter
Qvintus
Rudolf
Sigurd
Tore
Urban
Viktor
Wilhelm
Xerxes
Yngve
Zata
Ake
Arlig
сюжасолвов н
+
Ен
Туда
Тгеа
Еуга
Femma
Sexa
Sju
Ана
Міа
Nolla
Punkt
Komma
Minus
Plus
Mellanslag
Tabell 4: Svenska bokstaveringsalfabetet
2.2 Bokstaveringsalfabetet (Internationella)
OzgrmR——-unOonumogouvo»
мехк<сяаояоот
Рара
Quebec
Romeo
Sierra
Tango
Uniform
Victor
Whiskey
X-ray
Yankee
Zulu
Alfa-Alfa
Alfa-Echo
Oscar-Echo
ج س یم یں ج ی с мч с ©
den 22 december 2020 13:41:53 - rhb-full-v2.0.2.pdf
539 / 570
SECUR
355 / 569 339 / 340 355 / 570
b І AN Ser ao!
м; tet OT
Я M -
1
ж
ез
: —L)
е =
¿u A
+ Atal
This photo is taken by a U.S. Air Force
557 / 569 "a En Ж ¥ Ë
Aircraft. №
^w:
ә,
=
4 СІ ШІ? Be |
| don't understand why the Department of Defense releases the Unknown Aircraft image,
above, in 'black and white' // when they could have released the image in full color instead.
š
+
„ш
-
-
—
T
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
561 / 569 561 / 570
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
359 / 569 359 / 570
350 / 569 334 / 340
М
ры
(! |
p
1 /
)
J
- СА Т
2 | $, є
` | 9
М ` y j | )
қ | у \ / /
N / А A /
NN oL. Mom 7 اب
` j / > /
N / / 4
ә! /
Е Ay
алада =s r
564 / 569 564 / 570
PASS
PASSPORT SVERIGE SWEDEN
PASSEPORT P = SWE
ПОЈ рот
NORSTROM
2. Fórnamn/ Given name
* PER GUSTAV OLOF
З. NationaliteU Notionaiity
SVENSK/ SWEDISH
Personnr./ Personal 10, №
7740621: 1799
.edatum/ Date of b
21 JUNJUN 74
Q8 DEC/ ТЕС: 22
7. Sista айпапе! 5бад/
Q8 DEC/DEC 2)
101809
| GUSTAV NORSTRÖM
HÜGKVARTERET
DATASERVICE ADM AU-IT
SWEDISH MILITARY HQ W
352 / 569 336 / 340
—
—_
iL
Gustav Norstróm
U.S. Department of Defense
356 / 570
340 / 340
356 / 569
RESTRICTED
SOM!1-01
TO 12D1-3-11-1
MAJESTIC-12 GROUP SPECIAL OPERATIONS MANUAL
EXTRATERRESTRIAL
ENTITIES AND TECHNOLOGY,
RECOVERY AND DISPOSAL
TOP SECRET/MAJIC
EYES ONLY
WARNING?! This is a TOP SECRET-MAJIC EYES
ONLY document containing compartmentalized in-
formation essential to the national security of the
United States. EYES ONLY ACCESS to the mater-
ial herein is strictly limited to personnel possessing
MAJIC-12 CLEARANCE LEVEL. Examination
or use by unauthorized personnel is strictly forbid-
den and is punishable by federal law.
MAJESTIC-12 GROUP * APRIL 1954
MJ-12 4838B-Mar 270435°-54-1
TOPSECRET/MAJIC EYES ONLY
REMOVAL AND / OR REPLACEMENT OF PAGE(S) ATTACHED TO THE
DOCUMENT REQUIRES WRITTEN AUTHORIZATION FROM THE MAJIC-12
OPERATIONS OFFICER AND WILL BE RECORDED BY THE DOCUMENTS/
RECORDS OFFICER FOR EACH INSTANCE.
Г HEPLACEDTRUEADATE | INITE
5
E 1135/120CT54
ЕМ 1015 /1140у54
ЕМІ. | 0800/10ҒЕВ55
0920/120CT54
1595/10Ч0У54
MJ /01
32-40
18.19| 1425/08FEB55
PAGES 31-40 INCLUSIVE REMOVED PERMANENTLY FROM DOCUMENT
BY ORDER Mj-12 COMMAND 0930/ 12 APRIL 1955 (М7/031-54
8-10 | 1200/31MAY55 ЕҮТШЕНІ 1415/31МАҰ55 EWL
.20 |0959/032UL5 ГЕГІЕІ 0830/12.701.55
5.6 1304/10МАУ56 MJ/04 ЕН 0900/14MAY56 JRT
17-19| 1050/16AUG56 а 1635/16AUG56 JRT
6.12.| 18 0919/05ғЕВ | 57 MJ/01| JRT| 1105/05ҒЕВ57 JRT
іл
г
MJ-12 4838В
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOP SECRET/MAJIC
EYES ONLY
WARNING?! This is а TOP SECRET-MAJIC EYES
ONLY document containing compartmentalized in-
formation essential to the national security of the
United States. EYES ONLY ACCESS to the mater-
ial herein is strictly limited to personnel possessing
MAJIC-12 CLEARANCE LEVEL. Examination
or use by unauthorized personnel is strictly forbid-
den and is punishable by federal law.
Removal of any page(s) from this document for
examination by authorized person requires written
authorization from the MJ-12 OPNAC OPERA-
TIONS OFFICER. Reproduction in any form or
the taking of written or transcribed notes is strictly
forbidden.
TOPSECRET/MAJIC EYES ONLY
Special Operations Manual MAJESTIC-12 GROUP
No. 1- 01 Washington 25, D.C., 7 April 1954
EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY,
RECOVERY AND DISPOSAL
Chapter 1. OPERATION MAJESTIC-12 Paragraphs Page
Section I. Project purpose and goals ....................... 1-5 2
Chapter 2. INTRODUCTION
SECRET ое 6,7 4
IL Defniion «кб dat ..............— u uu 8-11 4
Chapter 3. RECOVERY OPERATIONS
Sedan E: сеу eere зитине у ier 12,13 8
П. Technology recovery —...............u u... 14-19 9
Chapter4. RECEIVING AND HANDLING
Section I. Handling upon receipt of material .......... 20 15
Chapter 5. EXTRATERRESTRIAL BIOLOGICAL
ENTITIES
Section I. Living Organisms ............................... 21-24 17
П. Non-Living Organisms ........................... 25,26 18
Chapter 6. GUIDE TO UFO IDENTIFICATION
Section ES: EOD BUGS SA SSSA 27-29 21
IL Identification criteria .............................. 30-35 22
Hi РОННИ ОРИ us 36,37 26
Appendix REFERENCES USSSA анты 28
Appenin ka- FORMS sss SS ыы 29
Appendix П. MAJIC-12 GROUP РЕКЗОММЕГ........ ......... 30
Append Ш: PHOTOGRAPHS екон ...... 31
MJ-12 4838B 1
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
CHAPTER 1
OPERATION MAJESTIC-12
Section 1. PROJECT PURPOSE AND GOALS
1. Scope
This manual has been prepared especially for Majestic-12 units. Its purpose is to present
all aspects of Majestic-12 so authorized personnel will have a better understanding of the goals
of the Group, be able to more expertly deal with Unidentified Flying Objects, Extraterrestrial
Technology and Entities, and increase the efficiency of future operations.
2. General
MJ-12 takes the subject of the UFOBs, Extraterrestrial Technology and Extraterrestrial
Biological Entities very seriously and considers the entire subject to be a matter of the very
highest national security. For that reason everything relating to the subject has been assigned the
very highest security classification. Three main points will be covered in this section.
a. The general aspects of MJ-12 to clear up any misconceptions that anyone may have.
b. The importance of the operations.
c. The need for absolute secrecy in all phases of operations.
3. Security Classification
All information relating to MJ-12 has been classified MAJIC EYES ONLY and carries a
security level 2 points above that of Top Secret. The reason for this has to do with the
consequences that may arise not only from the impact upon the public should the existence of
such matters become general knowledge, but also the danger of having such advanced
technology as has been recovered by the Air Force fall into the hands of unfriendly foreign
powers. No information is released to the public press and the official government position is
that no special group such as MJ-12 exists.
4. History of the Group
Operation Majestic-12 was established by special classified presidential order on 24
September 1947 at the recommendation of Secretary of Defense James V. Forrestal and Dr.
Vannevar Bush, Chairman of the Joint Research and Development Board. Operations are carried
out under a Top Secret Research and Development - Intelligence Group directly responsible only
to the President of the Unites States. The goals of the MJ-12 Group are as follows:
a. The recovery for scientific study of all materials and devices of a foreign or
extraterrestrial manufacture that may become available. Such material and devices will be
recovered by any and all means deemed necessary by the Group.
b. The recovery for scientific study of all entities and remains of entities not of terrestrial
origin which may become available through independent action by those entities or by
misfortune or military action.
c. The establishment and administration of Special Teams to accomplish the above
MJ-12 4838B 2
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
operations.
d. The establishment and administration of special secure facilities located at secret
locations within the continental borders of the Unites States for the receiving, processing,
analysis, and scientific study of any and all materials and entities classified as being of
extraterrestrial origin by the Group of the Special Teams.
e. Establishment and administration of covert operations to be carried out in concert with
Central Intelligence to effect the recovery for the United States of extraterrestrial technology and
entities which may come down inside the territory of or fall into the possession of foreign
powers.
f. The establishment and maintenance of absolute top secrecy concerning all the above
operations.
5. Current Situation
It is considered as far as the current situation is concerned, that there are few indications
that these objects and their builders pose a direct threat to the security of the United States,
despite the uncertainty as to their ultimate motives in coming here. Certainly the technology
possessed by these beings far surpasses anything known to modern science, yet their presence
here seems to be benign, and they seem to be avoiding contact with our species, at least for the
present. Several dead entities have been recovered along with a substantial amount of wreckage
and devices from downed craft, all of which are now under study at various locations. No
attempt has been made by extraterrestrial entities either to contact authorities or to recover their
dead counterparts or the downed craft, even though one of the crashes was the result of direct
military action. The greatest threat at this time arises from the acquisition and study of such
advanced technology by foreign powers unfriendly to the United States. It is for this reason that
the recovery and study of this type of material by the United States has been given such a high
priority.
MJ-12 4838B 3
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
CHAPTER 2
INTRODUCTION
Section 1. GENERAL
6. Scope
a. This operation manual is published for the information and guidance of all concerned.
It contains information on determination, documentation, collection, and disposition of debris,
devices, craft, and occupants of such craft as defined as Extraterrestrial Technology or
Extraterrestrial Biological Entities, EBEs in Section II of this chapter.
b. Appendix I-Ia contains а list of current references, including technical manuals and
other available publications applicable to these operations.
c. Appendix II contains a list of personnel who comprise the Majestic-12 Group.
7. Forms and Records
Forms used for reporting operation are listed in Appendix I.
Section Il. DEFINITION AND DATA
8. General
Extraterrestrial Technology is defined as follows:
a. Aircraft identified as not manufactured in the United States or any terrestrial foreign
powers, including experimental military or civilian aircraft. Aircraft in this category are
generally known as Unidentified Flying Objects, or UFOBs. Such aircraft may appear as one of
several shapes and configurations and exhibit extraordinary flight characteristics.
b. Objects and devices of unknown origin or function, manufactured by processes or of
materials not consistent with current technology or scientific knowledge.
c. Wreckage of any aircraft thought to be of extraterrestrial manufacture or origin. Such
wreckage may be the results of accidents or military action.
d. Materials that exhibit unusual or extraordinary characteristics not consistent with
current technology or scientific knowledge.
Extraterrestrial Biological Entities (EBEs) are described as:
a. Creatures, humanoids or otherwise, whose evolutionary processes responsible for their
development are demonstrably different from those postulated or observed in homo sapiens.
9. Description of Craft
Documented extraterrestrial craft (UFOBs) are classified in one of four categories based
on general shape, as follows:
a. Elliptical, or disc shape. This type of craft is of a metallic construction and dull
aluminum in color. They have the appearance of two pie-pans or shallow dishes pressed
together and may have a raised dome on the top or bottom. No seams or joints are visible on the
surface, giving the impression of one-piece construction. Discs are estimated from 50-300 feet
in diameter and the thickness is approximately 15 per cent of the diameter, not including the
MJ-12 4838B 4
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
dome, which is 30 per cent of the disc diameter and extends another 4-6 feet above the main
body of the disc. The dome may or may not include windows or ports, and ports are present
around the lower rim of the disc in some instances. Most disc-shaped craft are equipped with
lights on the top and bottom, and also around the rim. These lights are not visible when the craft
is at rest or not functioning. There are generally no visible antenna or projections. Landing gear
consists of three extendible legs ending in circular landing pads. When fully extended this
landing gear supports the main body 2-3 feet above the surface at the lowest point. A
rectangular hatch is located along the equator or on the lower surface of the disk.
b. Fuselage or cigar shape. Documented reports of this type of craft are extremely rare.
Air Force radar reports indicate they are approximately 2 thousand feet long and 95 feet thick,
and apparently they do not operate in the lower atmosphere. Very little information is available
on the performance of these craft, but radar reports have indicated speeds in excess of 7,000
miles per hour. They do not appear to engage in the violent and erratic maneuvers associated
with the smaller types.
c. Ovoid or circular shape. This type of craft is described as being shaped like an ice
cream cone, being rounded at the large end and tapering to a near-point at the other end. They
are approximately 30-40 feet long and the thick end diameter is approximately 20 per cent of the
length. There is an extremely bright light at the pointed end, and this craft usually travels point
down. They can appear to be any shape from round to cylindrical, depending upon the angle of
observation. Often sightings of this type of craft are elliptical craft seen at an inclined angle or
edge-on.
d. Airfoil or triangular shape. This craft is believed to be new technology due to the
rarity and recency of the observations. Radar indicates an isosceles triangle profile, the longest
side being nearly 300 feet in length. Little is known about the performance of these craft due to
the rarity of good sightings, but they are believed capable of high speeds and abrupt maneuvers
similar to or exceeding the performance attributed to types “а” and “с”.
10. Description of Extraterrestrial Biological Entities (EBEs)
Examination of remains recovered from wreckage of UFOBs indicates that
Extraterrestrial Biological Entities may be classified into two distinct categories as follows:
a. EBE Type I. These entities are humanoid and might be mistaken for human beings of
the Oriental race if seen from a distance. They are bi-pedal, 5-5 feet 4 inches in height and
weigh 80-100 pounds. Proportionally they are similar to humans, although the cranium is
somewhat larger and more rounded. The skin is a pale, chalky-yellow in color, thick, and
slightly pebbled in appearance. The eyes are small, wide-set, almond-shaped, with brownish-
black irises with very large pupils. The whites of the eyes are not like that of humans, but have a
pale gray cast. The ears are small and set low on the skull. The nose is thin and long, and the
mouth is wider than in humans, and nearly lipless. There is no apparent facial hair and very little
body hair, that being very fine and confined to the underarm and the groin area. The body is thin
and without apparent body fat, but the muscles are well-developed. The hands are small, with
opposable, and there is no webbing between the fingers as in humans. The legs are slightly but
noticeably bowed, and the feet are somewhat splayed and proportionally large.
MJ-12 4838B 5
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
b. EBE Type II. These entities are humanoid but differ from Type I in many respects.
They are bi-pedal, 3 feet 5 inches - 4 feet 2 inches in height and weigh 25-50 pounds.
Proportionally, the head is much larger than humans or Type I EBEs, the cranium being much
larger and elongated. The eyes are very large, slanted, and nearly wrap around the side of the
skull. They are black with no whites showing. There is no noticeable brow ridge, and the skull
has a slight peak that runs over the crown. The nose consists of two small slits which sit high
above the slit-like mouth. There are no external ears. The skin is a pale bluish-gray color, being
somewhat darker on the back of the creature, and is very smooth and fine-celled. There is no
hair on either the face or the body, and these creatures do not appear to be mammalian. The
arms are long in proportion to the legs, and the hands have three long, tapering fingers and a
thumb which is nearly as long as the fingers. The second finger is thicker than the others, but not
as long as the index finger. The feet are small and narrow, and four toes are joined together with
a membrane.
It is not definitely known where either type of creature originated, but it seems certain
that they did not evolve on earth. It is further evident, although not certain, that they may have
originated on two different planets.
11. Description of Extraterrestrial Technology
The following information is from preliminary analysis reports of wreckage collected
from crash sites of extraterrestrial craft 1947-1953, excerpts from which are quoted verbatim to
provide guidance as to the type of characteristics of material that might be encountered in future
recovery operations.
a. Initial analysis of the debris from the crash site seems to indicate that the debris is that
of an extraterrestrial craft which exploded from within and came into contact with the ground
with great force, completely destroying the craft. The volume of matter indicates that the craft
was approximately the size of a medium aircraft, although the weight of the debris indicates that
the craft was extremely light for its size.
b. Metallurgical analysis of the bulk of the debris recovered indicates that the samples are
not composed of any materials currently known to Terrestrial science.
c. The material tested possesses great strength and resistance to heat in proportion to its
weight and size, being stronger by far than any materials used in military or civilian aircraft at
present.
d. Much of the material, having the appearance of aluminum foil or aluminum-
magnesium sheeting, displays none of the characteristics of either metal, resembling instead
some kind of unknown plastic-like material.
e. Solid structures and substantial beams having a distinct similarity in appearance to
very dense grain-free wood, was very light in weight and possesses tensile and compression
strength not obtainable by any means known to modern industry.
f. None of the material tested displayed measurable magnetic characteristics or residual
radiation.
g. Several samples were engraved or embossed with marks and patterns. These patterns
were not readily identifiable and attempts to decipher their meaning has been largely
unsuccessful.
h. Examination of several apparent mechanical devices, gears, etc. revealed little or
nothing of their functions or methods of manufacture.
MJ-12 4838B 6
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
CHAPTER 3
RECOVERY OPERATIONS
Section 1. SECURITY
12. Press Blackout
Great care must be taken to preserve the security of any location where Extraterrestrial
Technology might be retrievable for scientific study. Extreme measures must be taken to protect
and preserve any material or craft from discovery, examination, or removal by civilian agencies
or individuals of the general public. It is therefore recommended that a total press blackout be
initiated whenever possible. If this course of action should not prove feasible, the following
cover stories are suggested for release to the press. The officer in charge will act quickly to
select the cover story that best fits the situation. It should be remembered when selecting a cover
story that official policy regarding UFOBs is that they do not exist.
a. Official Denial. The most desirable response would be that nothing unusual has
occurred. By stating that the government has no knowledge of the event, further investigation by
the public press may be forestalled.
b. Discredit Witnesses. If at all possible, witnesses will be held incommunicado until the
extent of their knowledge and involvement can be determined. Witnesses will be discouraged
from talking about what they have seen, and intimidation may be necessary to ensure their
cooperation. If witnesses have already contacted the press, it will be necessary to discredit their
stories. This can best be done by the assertion that they have either misinterpreted natural
events, are the victims of hysteria or hallucinations, or are the perpetrators of hoaxes.
c. Deceptive Statements. It may become necessary to issue false statements to preserve
the security of the site. Meteors, downed satellites, weather balloons, and military aircraft are all
acceptable alternatives, although in the case of the downed military aircraft statement care
should be exercised not to suggest that the aircraft might be experimental or secret, as this might
arouse more curiosity of both the American and the foreign press. Statements issued concerning
contamination of the area due to toxic spills from trucks or railroad tankers can also serve to
keep unauthorized or undesirable personnel away from the area.
13. Secure the Area
The area must be secured as rapidly as possible to keep unauthorized personnel from
infiltrating the site. The officer in charge will set up a perimeter and establish a command post
inside the perimeter. Personnel allowed on the site will be kept to the absolute minimum
necessary to prepare the craft or debris for transport, and will consist of Military Security Forces.
Local authorities may be pressed into service on traffic and crowd control. Under no
circumstances will local official or law enforcement personnel be allowed inside the perimeter
and all necessary precautions should be taken to ensure that they do not interfere with the
operation.
a. Perimeter. It is desirable that sufficient military personnel be utilized to set up а
perimeter around the site large enough to keep both unauthorized personnel and the perimeter
МЈ-12 4838B 7
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
personnel from seeing the site. Once the site is contained, regular patrols will be set up along the
perimeter to ensure complete security, and electronic surveillance will be utilized to augment the
patrols. Perimeter personnel will be equipped with hand communication and automatic weapons
with live ammunition. Personnel working at the site will carry sidearms. No unauthorized
personnel will be allowed into the secure area.
b. Command Post. Ideally, the command post should be as close to the site as is practical
to efficiently coordinate operations. As soon as the command post is operational, contact with
the Majestic-12 Group will be established via secure communications.
c. Area Sweep. The site and the surrounding area will be cleared of all unauthorized
personnel. Witnesses will be debriefed and detained for further evaluation by MJ-12. Under no
circumstances will witnesses be released from custody until their stories have been evaluated by
MJ-12 and they have been thoroughly debriefed.
d. Situation Evaluation. A preliminary evaluation of the situation will be completed and
a preliminary report prepared. The MJ-12 Group will then be briefed on the situation at the
earliest possible opportunity. The MJ-12 Group will then make a determination as to whether or
not a MJ-12 RED TEAM or OPNAC Team will be dispatched to the area.
Section ІІ. TECHNOLOGY RECOVERY
14. Removal and Transport
As soon as communication is established, removal and transport of all material will
commence under order from MJ-12.
a. Documentation. И the situation permits, care should be taken to document the area
with photographs before anything is moved. The area will be checked for radiation and other
toxic agents. If the area cannot be kept secure for an extended period of time, all material must
be packed and transported as quickly as possible to the nearest secure military facility. This will
be accomplished by covered transport using little-traveled roads wherever possible.
b. Complete or Functional Craft. Craft are to be approached with extreme caution if they
appear functional, as serious injury may result from exposure to radiation and electrical
discharges. If the craft is functioning, but appears to be abandoned, it may be approached only
by specially trained MJ-12 RED TEAM personnel wearing protective clothing. Any device that
seems to be functioning should also be left to MJ-12 RED TEAM disposal. Complete craft and
parts of crafts too large to be transported by covered transport will be disassembled, if this can be
accomplished easily and quickly. If they must be transported whole, or on open flatbed trailers,
they will be covered in such a manner as to camouflage their shape.
c. Extraterrestrial Biological Entities. EBEs must be removed to a top security facility as
quickly as possible. Great care should be taken to prevent possible contamination by alien
biological agents. Dead EBEs should be packed in ice at the earliest opportunity to preserve
tissues. Should live EBEs be encountered, they should be taken into custody and removed to a
top security facility by ambulance. Every effort should be taken to ensure the EBE's survival.
Personnel involvement with EBEs alive or dead must be kept to an absolute minimum. (See
Chapter 5 for more detailed information dealing with EBEs.)
MJ-12 4838B 8
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
15. Cleansing the Area
Once all material has been removed from the central area, the immediate area will be
thoroughly inspected to make sure that all traces of Extraterrestrial Technology have been
removed. In the case of a crash, the surrounding area will be thoroughly gone over several times
to ensure that nothing has been overlooked. The search area involved may vary according to
local conditions, at the discretion of the officer in charge. When the officer in charge is satisfied
that no further evidence of the event remains at the site, it may be evacuated.
16. Special or Unusual Conditions
The possibility exists that extraterrestrial craft may land or crash in heavily populated
areas, where security cannot be maintained or where large segments of the population and the
public press may witness these events. Contingency Plan MJ-1949-04P / 78 (TOP SECRET-
EYES ONLY) should be held in readiness should the need to make a public disclosure become
necessary.
MJ-12 4838B 9
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
от
MFT TVI3Q34 АЯ NYGGISUOJ SI WHOA ANV NI NOLLINGOUdTa
AINO БЯАЯ ОТГУИ / ТЯМОЯ5 dO L
176 15 tory
88-85 12 Зшрітя
OTO-ALAA
УРА
"“Кпюдиом әлізиәҙор 10 омзцецо әд OF зу8поцу S3iAƏp е JO uoruod 10 аллар Au
"шу pue $44248 03044 “suvys *sdeur *s8urpioses 21:01322]3 oye pyung
зарвш DUBBO dsns 1940
put sutua оптийто 'suisrum820 jo suoniod 10 SUISILRS10 upuimu-uou posea2o(q
"кә 2198405691 Jo ро08 3uaedde ш 505100810 ueumy-uou BütAT7
одо ‘so[qHs93u! o1uvfao *sSuifluojoq jeuosuod
“Ишціо|2 se ons ammeu nioddns в jo зецаеш 21u01329]2-u0u 10 |вошецоэш-цом
"sensuojovieuo Gieurploenxo JO [ensnum {Хә цеца pue 4801000291
рив ooueros шамио о} UMOWY JOU вые 10 єушошојә зо роѕойшоо sjuou Sv.
“O19 "ànsgjd "ииваизеш *tunutumge ел 'Agojouuoa) рив 3019155
поло 0) пмоцу se pozrus0221 Кибво speriat то вита] Jo ровойшод зиэшет I
"spouted pug sə3iAəp |0диоо pejtioosse
19-4м 48197181
10-589 OVN4O
Ox-du3
010-993
19-4 чел ang 16-45
fS 15 Bary и-еогал
1-5 15 vay Юг
р-9 IŞ tuy г)8-0ғ-а4 pue тоту “иип повиадст 21915504 ore qorqa 51091301] Jo seurgowur pue sa3iAa(]
"ојӣшоо Арвош
PS IS Bay №м505-аа mq рәбешер aq о} sreaddg yorym ошцовш 10 аэтдар әшолсәрә 10 [зэтазузаш Luy
Зецоцошу
FS 15 PIV 3T-TOC-GHI
9-с00-У1
aP% ст
pu» poseurepun 24 o) sreadde цеца ошцовш 10 Ə31A3D ошолсәТә Jo үвәїйвүдәш Ашу
"зицовимеш pue uñisəp фещвеленха JO aia завуш-циов 10 'feuore1edo Зов
AINO SHAT ОТГУИ / LAXOAS аот
“BIPOW
"Anus
SU:Af[-UON
« Ques Sur]
“suoisiAoid
рив soyddng
"Зашел
pognuoprur]
жәшігі
рауичерт
зов Шәлод
"залор
реввшед
“Ə91A9p ә
51981 0625115585 бојоццоә г emsan 'ZL
TOPSECRET/MAJIC EYES ONLY
18. Use of Inventory System
a. The identification is performed as a duty of the officer making an inventory of the
Extraterrestrial Technology or entities with the assistance of MJ Forms 1-006 and 1-007. (Fig. 1
and 2.) Instructions for the use of each form appear on the reverse side of the forms.
SOM 01 - 1
Figure 1. MJ Form 1-006
MJ-12 4838B 11
TOPSECRET/MAJIC EYESONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
ТОР ЗЕСКЕТ ; MAJIC EY ES ONLY
ЕЛІ МЕНДЕН mid IE D t PACKING LIST
TOP SECRET / МАПС EY ES ONL Y
SOM 01 -2
Figure 2. MJ Form 1-007
19. Packaging and Packing Data
a. Domestic Shipment. Individual items are tagged and wrapped in a moisture-
vaporproof barrier and heat sealed. They are then placed in a corrugated fiberboard box. The
voids within the box are packed thoroughly with a neutral cellulose wadding to prevent
MJ-12 4838B 12
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
movement of the items. The box closure is sealed with gummed Kraft tape. MJ Form 1-007 is
placed іп a sealed manila envelope marked *MAJIC-12 ACCESS ONLY” and is firmly taped to
the top of the box. The box is then cushioned at each corner and at the top and bottom with
fiberboard inserts and is placed within a large corrugated fiberboard box. The entire outer box
closure is sealed with gummed Kraft tape. A label is affixed to the outer box bearing the
following information: destination, shipping code number, and the warning, *MAJIC-12
ACCESS ONLY."
b. Overseas Shipment. Items are packaged as described above except that a dessicant and
humidity indicator are included within the inner corrugated fiberboard box. Next, the box is
wrapped in a moisture-vaporproof barrier and heat sealed. Then, packaged items are placed
within a second waterproof carton sealed with waterproof tape. This second carton is marked
*MAJIC-12 ACCESS ONLY” on all sides and is placed within а water-grease proof lined
wooden shipping container. The lining is sealed with waterproof tape and the wooden shipping
container is screwed shut. The shipping container is reinforced further by nailing two [3/4]-inch
metal caps about 8 inches from each end. Shipping information is then stenciled on the surface
of the wooden shipping container.
Note. The packaging and packing procedure detailed above applies to non-organic items only.
Data for handling, packaging, packing, and shipping of organic matter and non-living entities is provided
in Chapter 5, Section II of this manual.
MJ-12 4838B 13
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
CHAPTER 4
RECEIVING AND HANDLING
Section 1. HANDLING UPON RECEIPT OF MATERIAL
20. Uncrating, Unpacking, and Checking
(Fig. 3)
Note. The uncrating, unpacking, and checking procedure for containers marked *MAJIC-12
ACCESS ONLY” will be carried out by personnel with MJ-12 clearance. Containers marked in
this manner will be placed in storage in a top security area until such time as authorized
personnel are available for these procedures.
a. Be very careful when uncrating and unpacking the material. Avoid thrusting tools into
the interior of the shipping container. Do not damage the packaging material any more than is
absolutely necessary to remove the specimens; these materials may be required for future
packaging. Stow the interior packaging material within the shipping container. When uncrating
and unpacking the specimens, follow the procedure given in (1) through (11) below:
(1) Unpack the specimens in a top security area to prevent access of
unauthorized personnel.
(2 Cut the metal wires with a suitable cutting tool, or twist them with
pliers until the straps crystallize and break.
(3 | Remove screws from the top of the shipping container with a screw driver.
(4) Сш the tape and seals of the case liner so that the waterproof paper will be
damaged as little as possible.
(5) Lift out the packaged specimens from the wooden case.
(6) Си the tape which seals the top flaps of the outer cartons; be careful not to
damage the cartons.
(7) Сш the barrier along the top heat-sealed seam and carefully
remove the inner carton.
(8) | Remove the sealed manila envelope from the top of the inner carton.
(9) Open the inner carton and remove the fiberboard inserts, dessicant and
humidity indicator.
(10) Lift out the heat-sealed packaging containing the specimens; arrange them
in an orderly manner for inspection.
(11) Place all packaging material in the shipping container for use in future
repacking.
MJ-12 4838B 14
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
а ри ч :
Mi far or. wb "t the
Da fv (s the
SOM 01-3
Figure 3. Packaging diagram
b. Thoroughly check all items against the shipping documents. Carefully inspect all
items for possible damage during shipping or handling. Sort the items according to classification
number in preparation for transfer to the designated laboratory or department. Laboratory or
department personnel are responsible for transporting items to the designated areas. This will be
accomplished as quickly as possible by covered transport escorted by security personnel.
MJ-12 4838B 15
TOPSECRET/ MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
CHAPTER 5
EXTRATERRESTRIAL BIOLOGICAL ENTITIES
Section |. LIVING ORGANISMS
21. Scope
a. This section deals with encounters with living Extraterrestrial Biological Entities
(EBEs). Such encounters fall under the jurisdiction of MJ-12 OPNAC BBS-01 and will be dealt
with by this special unit only. This section details the responsibilities of persons or units making
the initial contact.
22. General
Any encounter with entities known to be of extraterrestrial origin is to be considered to
be a matter of national security and therefore classified TOP SECRET. Under no circumstances
is the general public or the public press to learn of the existence of these entities. The official
government policy is that such creatures do not exist, and that no agency of the federal
government is now engaged in any study of extraterrestrials or their artifacts. Any deviation
from this stated policy is absolutely forbidden.
23. Encounters
Encounters with EBEs may be classified according to one of the following categories:
a. Encounters initiated by EBEs. Possible contact may take place as a result of overtures
by the entities themselves. In these instances it is anticipated that encounters will take place at
military installations or other obscure locations selected by mutual agreement. Such meetings
would have the advantage of being limited to personnel with appropriate clearance, away from
public scrutiny. Although it is not considered very probable, there also exists the possibility that
EBEs may land in public places without prior notice. In this case the OPNAC Team will
formulate cover stories for the press and prepare briefings for the President and the Chiefs of
Staff.
b. Encounters as the result of downed craft. Contact with survivors of accidents or craft
downed by natural events or military action may occur with little or no warning. In these cases,
it is important that the initial contact be limited to military personnel to preserve security.
Civilian witnesses to the area will be detained and debriefed by MJ-12. Contact with EBEs by
military personnel not having MJ-12 or OPNAC clearance is to be strictly limited to action
necessary to ensure the availability of the EBEs for study by the OPNAC Team.
24. Isolation and Custody
a. EBEs will be detained by whatever means are necessary and removed to a secure
location as soon as possible. Precautions will be taken by personnel coming in contact with
EBEs to minimize the risk of disease as a result of contamination by unknown organisms. If the
entities are wearing space suits or breathing apparatus of some kind, care should be exercised to
prevent damage to these devices. While all efforts should be taken to assure the well-being of
the EBEs, they must be isolated from any contact with unauthorized personnel. While it is not
clear what provisions or amenities might be required by non-human entities, they should be
MJ-12 4838B 16
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
provided if possible. The officer in charge of the operation will make these determinations, as
no guidelines now exist to cover this area.
b. Injured or wounded entities will be treated by medical personnel assigned to the
OPNAC Team. If the team medical personnel are not immediately available, First Aid will be
administered by Medical Corps personnel at the initial site. Since little is known about EBE
biological functions, aid will be confined to the stopping of bleeding, bandaging of wounds and
splinting of broken limbs. No medications of any kind are to be administered as the effect of
terrestrial medications on non-human biological systems are impossible to predict. As soon as
the injuries are considered stabilized, the EBEs will be moved by closed ambulance or other
suitable conveyance to a secure location.
c. In dealing with any living Extraterrestrial Biological Entity, security is of paramount
importance. All other considerations are secondary. Although it is preferable to maintain the
physical well-being of any entity, the loss of EBE life is considered acceptable if conditions or
delays to preserve that life in any way compromises the security of the operations.
d. Once the OPNAC Team has taken custody of the EBEs, their care and transportation to
designated facilities become the responsibility of OPNAC personnel. Every cooperation will be
extended to the team in carrying out duties. OPNAC Team personnel will be given TOP
PRIORITY at all times regardless of their apparent rank or status. No person has the authority to
interfere with the OPNAC Team in the performance of its duties by special direction of the
President of the United States.
Section Il. NON-LIVING ORGANISMS
25. Scope
Ideally, retrieval for scientific study of cadavers and other biological remains will be
carried out by medical personnel familiar with this type of procedure. Because of security
considerations, such collection may need to be done by non-medical personnel. This section will
provide guidance for retrieval, preservation, and removal of cadavers and remains in the field.
26. Retrieval and Preservation
а. The degree of decomposition of organic remains will vary depending on the length of
time the remains have been lying in the open unprotected and may be accelerated by both local
weather conditions and action by predators. Therefore, biological specimens will be removed
from the crash site as quickly as possible to preserve the remains in as good a condition as
possible. A photographic record will be made of all remains before they are removed from the
site.
b. Personnel involved in this type of operation will take all reasonable precautions to
minimize physical contact with the cadavers or remains being retrieved. Surgical gloves should
be worn or, if they are not available, wool or leather gloves may be worn provided they are
collected for decontamination immediately after use. Shovels and entrenching tools may be
employed to handle remains provided caution is exercised to be certain no damage is done to the
remains. Remains will be touched with bare hands only if no other means of moving them can
be found. All personnel and equipment involved in recovery operations will undergo
decontamination procedures immediately after those operations have been completed.
MJ-12 4838B 17
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
c. Remains will be preserved against further decomposition as equipment and conditions
permit. Cadavers and remains will be bagged or securely wrapped in waterproof coverings.
Tarpaulins or foul weather gear may be used for this purpose if necessary. Remains will be
refrigerated or packed with ice if available. All remains will be tagged or labeled and the time
and date recorded. Wrapped remains will be placed on stretchers or in sealed containers for
immediate removal to a secure facility.
d. Small detached pieces and material scraped from solid surfaces will be put in jars or
other small capped containers if available. Containers will be clearly marked as to their contents
and the time and date recorded. Containers will be refrigerated or packed with ice as soon as
possible and removed to a secure facility.
MJ-12 4838B 18
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
Y
“
eoe 7
Note: Illustrations in this diagram are gathered from documented sightings in Air Force and Central Intelligence and from
Examination of wreckage collected from various sources years 1947-1953 inclusive.
SOM 01-4
Figure 4. Extraterrestrial Craft
MJ-12 4838B 19
TOPSECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOPSECRET/MAJIC EYES ONLY
CHAPTER 6
GUIDE TO UFO IDENTIFICATION
Section 1. UFOB GUIDE
27. Follow-up Investigations
A UFOB report is worthy of follow-up investigation when it contains information to
suggest that positive identification with a well-known phenomenon may be made or when it
characterizes an unusual phenomenon. The report should suggest almost immediately, largely
by the coherency and clarity of the data, that there is something of identification and / or
scientific value. In general, reports which should be given consideration are those which involve
several reliable observers, together or separately, and which concern sightings of greater duration
than one quarter minute. Exception should be made to this when circumstances attending the
report are considered to be extraordinary. Special attention should be given to reports which
give promise to а “fix” on the position and those reports involving unusual trajectories.
28. Rules of Thumb
Each UFOB case should be judged individually but there are a number of “rules of
thumb", under each of the following headings, which should prove helpful in determining the
necessity for follow-up investigation.
a. Duration of Sighting. When the duration of a sighting is less than 15 seconds, the
probabilities are great that it is not worthy of follow-up. As a word of caution, however, should
a large number of individual observers concur on an unusual sighting of a few seconds duration,
it should not be dismissed.
b. Number of Persons Reporting the Sighting. Short duration sightings by single
individuals are seldom worthy of follow-up. Two or three competent independent observations
carry the weight of 10 or more simultaneous individual observations. As an example, 25 people
at one spot may observe a strange light in the sky. This, however, has less weight than two
reliable people observing the same light from different locations. In the latter case a position-fix
is indicated.
c. Distance from Location of Sightings to Nearest Field Unit. Reports which meet the
preliminary criterion stated above should all be investigated if their occurrence is in the
immediate operating vicinity of the squadron concerned. For reports involving greater distances,
follow-up necessity might be judged as being inversely proportional to the square of the
distances concerned. For example, an occurrence 150 miles away might be considered to have
four times the importance (other things being equal) than one that is 300 miles away.
d. Reliability of Person or Persons Reporting. Іп establishing the necessity of follow-up
investigation only “short term" reliability of individuals can be employed. Short term reliability
is judged from the logic and coherency of the original report and by the age and occupation of
the person. Particular attention should be given to whether the occupation involves observation
reporting or technical knowledge.
e. Number of Individual Sightings Reported. Two completely individual sightings,
especially when separated by a mile or more constitutes sufficient cause for follow-up, assuming
previous criterion have not been violated.
MJ-12 4838B 20
TOP SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOP SECRET/MAJIC EYES ONLY
f The Value of Obtaining Additional Information Immediately. If the information cannot
be obtained within seven days, the value of such information is greatly decreased. It is of great
value to obtain additional information immediately if previously stated criteria have been met.
Offen, if gathered quickly, two or three items (weather conditions, angular speed, changes in
trajectory, duration, etc.) are sufficient for immediate evaluation. If investigation is undertaken
after weeks or months, the original observers cease to be of value as far as additional new
information is concerned. Generally, late interrogation yields only bare repetition of facts
originally reported plus an inability on the part of the observer to be objective.
8. Existence of Physical Evidence (Photographs, Material, Hardware). Іп cases where
any physical evidence exists, a follow-up should be made even if some of the above criteria have
not been met.
29. Conclusion - UFOB Guide.
It is understood that all above criteria must be evaluated in terms of “common sense."
The original report, from its working and clarity will almost always suggest to the reader
whether there is any “paydirt” in the report.
Section Il. IDENTIFICATION CRITERIA
30. General
When a UFO report meets, in large measure, the criteria projected in Section I and a
follow-up investigation is instituted, then the interrogator should ask what physical object or
objects might have served as the original stimulus for the report. The word “object” here
includes optical phenomena such as reflections from clouds, sundogs, etc. Frequently one or
perhaps two solutions will be immediately suggested by the nature of the report. The word
“solution” cannot be used here in the scientific sense. A solution in UFOB work means that a
hypothesis has been arrived at which appears to have the greatest probability of having given rise
to the given report. Following is a group of hypotheses or examples which should prove helpful
in arriving at solutions. A check should be made to see how many of the items are satisfied by
the report and how many are missing. An effort should be made to obtain any missing items as
soon as possible. Each typical hypothesis is listed in a separate paragraph.
31. Aircraft
a. Shape. From conventional to circular or elliptical.
b. Size. Pinpoint to actual
c. Color. Silver to bright yellow (night - black or color of lights).
d. Speed. Generally only angular speeds can be observed. This depends on distance but
small objects crossing major portion of sky in less than a minute can be ruled out. Aircraft will
not cross major portion of sky in less than a minute whereas a meteor certainly will.
e. Formation. Two to twenty. Numbers greater than 20 more likely birds than aircraft.
f. Trails. May or may not have (vapor and exhaust).
g. Sound. Zero to loud shrill or low depending on altitude.
h. Course. Steady, straight or gently curving (not erratic - may appear still if approaching
head-on). Right angle turns and sudden reversals, changes in altitude ruled out. Note: Although
report may indicate erratic course, if other items check, follow-up should proceed on basis of
MJ-12 4838B 21
TOP SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOP SECRET/MAJIC EYES ONLY
aircraft because of psychological tendencies of excited people to exaggerate course changes.
i. Time In Sight. More than 15 seconds, generally of the order of a minute or two.
j. Lighting Conditions. Night or Day.
k. Radar. Should show normal aircraft returns.
32. Balloons
a. Shape. Round to cigar or pinpoint.
b. Size. Balloons up to a hundred feet will generally appear from pinpoint to size of a pea
held at arm length.
c. Color. Silver, white or many tints. It may possibly appear dark as when projected
against the clouds.
d. Speed. Large scale erratic speed ruled out. In general, hovering to slow apparent
speed.
e. Formation. Single to cluster.
f. Trail. None.
g. Sound. None.
h. Course. Straight with a general gradual ascent, unless falling.
i. Time In Sight. Generally long. Note: Balloons may suddenly burst and disappear.
j. Lighting Conditions. Night or day but especially at sunset.
k. Radar. No return except when carrying sonde equipment.
33. Meteor
a. Shape. Round to elongated.
b. Size. Pinpoint to size of moon.
c. Color. Flaming yellow with red, green or blue possible.
d. Speed. Crosses large portion of sky in few seconds except if coming head-on.
e. Formation. Generally single - can break into shower at end of trajectory.
Occasionally (but rare) small groups.
f Trail. At night almost always a luminous train which can persist as long as a half hour
(rarely). Daytime meteors are much less frequently observed. In daytime, leaves a whitish to
dark smoke trail.
g. Sound. None, although occasionally reported (believed psychological).
h. Course. Generally streaking downward, but not necessarily sharply downward. Can
on rare occasion give impression of slight rise.
i. Time In Sight. Longest report about 30 seconds, generally less than 10.
j. Lighting Conditions. Day or Night. Mostly night.
k. Radar. Return from meteor itself is highly improbable, however, the train left by a
meteor, is a good radar reflector.
1. Other. Ап exceptionally bright meteor is called a fireball. These are rare but extremely
spectacular and on occasion have been known to light surroundings to the brightness of daylight.
MJ-12 4838B 22
ТОР SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOP SECRET/MAJIC EYES ONLY
34. Stars or Planets
The planets, Venus, Mars, Jupiter, and Saturn are generally brighter than any star, but
they twinkle very much less (unless very close to horizon). Stars twinkle a great deal and when
near the horizon can give impression of flashing light in many colors.
a. Shape. Pinpoint - starlike.
b. Size. Never appreciable.
c. Color. Yellow with rainbow variations.
d. Speed. Stars apparent speeds carry them from east to west in the course of the night
but they are often reported as erratic. The effect is psychological, most people being unable to
consider a point as being stationary. Occasionally turbulence in the upper atmosphere can cause
a star to appear to jump (rare) but somehow twinkling gives the impression of movement to
many people.
Note: Just because the report says the light moves does not rule out the possibility of it
being a star unless motion is from one part of sky to another relatively short time.
e. Formation. There are no clusters of very bright stars but faint stars are grouped in their
familiar constellations. Note: a report of 4 or 5 bright clustering lights would rule out stars.
f Trail. None.
g. Sound. None.
h. Course. Always describe 24 hour circle around pole of sky from east to west.
i. Time In Sight. When clear, stars are always visible. Most stars rise or set during the
course of the night. Stars low in western sky set within an hour or two. Stars in east, always go
higher in sky.
j. Lighting Conditions. Night - twilight.
k. Radar. None.
35. Optical Phenomena
This can cover a multitude of things. Original scanning of the report should be made to
attempt to determine whether it more likely describes a material object or an optical
phenomenon. Optical phenomena which have been reported as UFOBs run from reflections on
clouds and layers of ice crystals (sundogs) to the many types of mirages. No one set of optical
phenomena can be set down as representation for the whole class. There is no limit to the speed
of optical phenomena. Reflections can travel from incredible speed, as in the case of a search-
beacon on high clouds, to stationary. These cases if well reported will almost always warrant
follow-up. Their variety and connection with upper atmospheric conditions make these
observations especially valuable scientifically.
а. Shape. Generally round but can be elliptical or linear.
b. Size. Starlike to large luminous glow.
c. Color. Generally yellow.
d. Speed. Stationary to fantastic.
e. Formation. Any.
f Trail. None.
g. Sound. None.
h. Course. Any.
i. Time In Sight. Any.
j. Lighting Conditions. Day and night.
k. Radar. No return. In special cases, radar response will occasionally have to do with
MJ-12 4838B 23
TOP SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOP SECRET/MAJIC EYES ONLY
unusual clouds, and meteorological phenomena such as described іп Minnaert’s book “Light and
Color in the Open Air."
1. Other. One of the standard types is the “sundog.” In this a large luminous halo is seen
around the sun with one to four images of the sun placed along the halo circle at intervals of 90
degrees. Another report often has to do with a bright planet or even the moon shining through a
light overcast. Mirages reflections are said to occur frequently when temperature inversions
exists in the atmosphere. If an optical phenomena is suspected, routine check of the
meteorological records should be made to establish whether such inversions existed.
MJ-12 4838B 24
TOP SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
TOP SECRET/MAJIC EYES ONLY
APPENDIX I
REFERENCES
For the availability of items listed, check SR 310-20-3, SR 310-20-4, SR 310-20-5 and SR 310-
20-7.
1. [Applicable] Regulations
AR 380-4 Military security (Safeguarding Security In-
formation).
AR 750-4 Maintenance of Supplies and Equipment, Main-
tenance Responsibilities and Shop Operation.
2. Supply
SR 725-405-5 Preparation and Submission of Requisitions for
Supplies.
3. Other Publications
XX 219-20-3 Index of Training Manuals.
XX 310-20-4 Index of Technical Manuals, Technical Regula-
tions, Technical Bulletins, Supply Bulletin
Lubrications Orders, and Modification Work
Orders.
XX 310-20-5 Index of Administrative Publications.
XX 310-20-7 Index of Tables of Organization and Equipment,
Reduction Tables, Tables of Organization,
Tables of Equipment, Type Tables of Distri-
bution and Tables of Allowance.
4. Test Equipment References
TM 11-664 Theory and Use of Electronic Test Equipment.
5. Photographic References
TM 11-404A Photographic Print Processing Unit
AN/TFQ-9.
TM 11-405 Processing Equipment PH-406.
TM 11-401 Elements of Signal Photography.
TM 11-2363 Darkroom PH-392.
MJ-12 4838B
TOP SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
25
TOP SECRET/MAJIC EYES ONLY
Author Caveats
This manual is a replica of one that was photographed by an unknown person.
The Tri-X negatives were mailed to Mr. Don Berliner, postmarked March 7, 1994. Don
provided copies to the GAO. He took early initiative to determine their authenticity. Presently
in November 1998, although he has not been able to review the arguments summary, he is not
inclined to regard SOM 1-01 as genuine.
The 154 generation print copies became a basis for this replica. It is very accurate, and includes
faithful replication of the few errors missed by the original proofreaders. Through page 21 was
on the film, but pages 22-25 about the UFOB Guide were found in an unclassified FOIA released
document provided to Mr. Brian Parks from Maxwell Air Force Base, referring to the transmittal
of such a guide in an unclassified letter dated 14 Jan 1955.
This manual SOM 1-01 is now in the public domain, having been largely reprinted in a book,
“ТОР SECRET/MAJIC” by Mr. Stanton T. Friedman. That version, however, is incomplete,
contains typesetting errors, and does not replicate the six by nine-inch format that was used.
А number of arguments have been proposed to question the authenticity. It is the authors’
opinions that they have all been dealt with, and that there is no question at all that this is a
genuine manual used for the purposes stated therein.
These points of discussion will be treated in detail in an upcoming book by the authors noted
below.
О Robert M. Wood & Ryan S. Wood October 1998
P.O. Box 2272, Redwood City, CA 94064-2272
Email: drbobwood@aol.com & rswood@igc.apc.org
MJ-12 4838B
TOP SECRET/MAJIC EYES ONLY
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW
26
Jui TOP SECRET
Шах А20707 5/4/54/050
Oct 24 1952
MEMORANDUM FOR: The Secretary of State
The Secretary of Defense
SUBJECT: Communications Intelligence Activities
The communications intelligence (COMINT) activities of the United States
are a national responsibility. They must be organized and managed as to
exploit to the maximum the available resources in all participating departments
and agencies and to satisfy the iegitimate intelligence requirements of all
such departments and agencies.
I therefore designate the Secretary of State and Defense as a Special
Committee: of the National Security Council for COMINT, which Committee shall,
with the assistance of the Director of Central Intelligence, establish policies
governing COMINT activities, and keep me advised of such policies through the
Executive Secretary of the National Security Council.
I further designate the Department of Defense as executive agent of the
Government, for the production of COMINT information.
I direct this Special Committee to prepare and issue directives which
вһа11 include the provisions set forth below and such other provisions as the
Special Committee may determine to be necessary.
1. A directive to the United States Communications Inteliigence Board
(USCIB). This directive will replace the National Security Council
Intelligence Directive No.9, and shall prescribe USCIB’s new
composition, responsibilities and procedures in the COMINT fields. The
directive shall include the following provisions:
a. USCIB shall be reconstituted as a body acting for and under
the Special Committee, and shall operate in accordance with the pro-
visions of the new directive. Only those departments or agencies repre-
sented in USCIB are authorized to engaged in COMINT activities.
Downgraded per NSC Information Security Oversight
Office, 28 Jan 1981
NSA TS CONTL NO 7300405
COPY NUMBER 2
PAGE 7 ОҒ 8PAGES
COPY
TOP SECRET
TOP SECRET
COPY
b. The Board shall be composed of the following members:
(1) The Director of Central Intelligence, who shall be the
Chairman of the Board.
(2) A representative of the Secretary of State.
(3) A representative of the Secretary of Defense.
(4) A representative of the Director of the Federal
Bureau of Investigation.
(5) The Director of the National Security Agency.
(6) A representative of the Department of the Army.
(7) A representative of the Department of the Navy.
(8) A representative of the Department of the Air Force.
(9) A representative of the Central Intelligence Agency.
c. Тһе Board shall have a staff headed by an executive secretary
who shall be appointed by the Chairman with approval of the majority
of the Board.
d. It shall be the duty of the Board to advise and make recom-
mendations to the Secretary of Defense, in accordance with the
following procedure, with respect to any matter relating to
communications intelligence which falls within the juristiction of the
Director of NSA.
(1) The Board shall reach its decision by a majority vote.
Each member of the Board shall have one vote except the
representatives of the Secretary of State and of Central Intelligence
Agency who shall each have two votes. The Director of Central
Intelligence, as Chairman, will have no vote. Іп the event that the
Board votes and reaches a decision, any dissenting member of the
Board may appeal from such decision written 7 days to the
NSA TS CONTL. NO 7300405
COPY NUMBER 2
PAGE 2 ОҒ 8 PAGES
COPY
TOP SECRET
TOP SECRET
Special Committee. In the event that the Board votes but fails
to reach a decision, any member of the Board may appeal within
7 days to the Special Committee. In either event the Special
Committee shall review the matter, and its determination thereon
Shall be final. Appeals by the Director of NSA and/or the
representatives of the Military Departments shall only be fiied
with the approval of the Secretary of Defense.
(2) If any matter is voted on by the Board but-
fa) no decision is reached and any member files an appeal;
(b) a decision is reached in which the representative
of the Secretary of defense does not concur and files an appeal;
no action shall be taken with respect to the subject matter until
the appeal is decided, provided that, if the Secretary of Defense
determines, after consultation with the Secretary of State, that
the subject matter presents a problem of an emergency nature and
requires immediate action, his decision shall govern, pending the
result of the appeal. Іп such an emergency situation the appeal
may be taken directly to the President.
(3) Recommendations of the Board adopted in accordance with
the foregoing procedures shall be binding on the Secretary of
Defense. Except on matters which have been voted on by the
Board, the Director of NSA shall discharge his responsibilities
In accordance with his own judgement, subject to the direction
Of the Secretary of Defense.
(4) The Director of NSA shall make such report and furnish
such information from time to time to the Board, either orally
NSA TS CONTL. NO 7300405
COPY NUMBER 2
PAGE ЗОЕ 8PAGES
COPY
TOP SECRET
TOP SECRET
in writing, as the Board may request, and shall bring to the
attention of the Board either such reports or otherwise any
new major policies or programs in advance of their adoption by him.
e. It shall also be the duty of the Board as to matters not falling
within the jurisdiction of NSA;
(1) To coordinate the communications intelligence activities
among all departments and agencies authorized by the President
to participate therein;
(2) To initiate, to formulate policies concerning, and subject
to the provisions of NSCID No.5, to supervise all arrangements
with foreign governments in the field of communications intelligence;
and
(3) to consider and make recommendations concerning policies
relating to communications intelligence of common interest to the
departments and agencies, including security standards and procedures,
and, for this purpose, to investigate and study the standards and
practices of such departments and agencies in utilizing and
protecting COMINT information.
f. Any recommendation of the Board with respect to the matters
described in paragraph e above shall be binding on ail departments or
the members of the Board. Recommendations approved by a majority, but not
all of the members of the Board shall be transmitted by it to the
Special Cimmittee for such action as the Special Committee may see fit
To take.
g. The Board will meet monthly, or oftener at the call of the
Chairman or any member, and shall determine its own procedures.
NSA TS CONTL. МО 7300405
COPY NUMBER 2
PAGE 4OF 8 PAGES
COPY
TOP SECRET
TOP SECRET
2. A directive to the Secretary of Defense. This directive shall
Include the following provisions.
a. Subject to the specific provisions of this directive, the
Secretary of Defense may delegate in whole or in part authority over
The Director of NSA within his department as he sees fit.
b. Тһе COMINT mission of the National Security Agency (NSA) shall
Be to provide an effective, unified organization and control of the
communications intelligence activities of the United States conducted
against foreign governments, to provide for integrated operational
policies and procedures pertaining thereto. As used in this directive,
the terms “communications intelligence: or “СОМТНТ” shall be construed
all procedures and methods used in the interception of communications
other than foreign press and propaganda broadcasts and the intended
recipients,* but shall include censorship and the production and
dissemination of finished intelligence.
C. NSA shall be administrated by a Director, designated by the
Secretary of Defense after consultation with the Joint Chiefs of Staff,
who shall serve for a minimum term of 4 years and who shall be eligibie
for reappointment. The Director shall be a career commissioned officer
of the armed services on active or reactivated status, and shall enjoy
at least 3 star rank during the period of his incumbancy.
d. Under the Secretary of Defense, and in accordance with approved
policies of USCIB, the Director of NSA shall be responsible for
accompiishing
e See Public Law 513- -817“ Congress 1950.
TOP SECRET
TOP SECRET
COPY
the mission of the NSA. For this purpose all COMINT collection and
production resources of the United States are place under his
operational and technical control. When action by the Chiefs of
the operating agencies of the Services or civiiian departments or
agencies is required, the Director shall normally issue instructions
pertaining to COMINT operations through them. However, due to the
unique technical character of COMINT operations, the Director is
authorized to issue direct to any operating elements under his
operational control task assignments and pertinent instructions which
are within the capacity of such elements to accomplish. He shall
also have direct access to, and direct communication with, any
elements of the service or civilian COMINT agencies on any other
matters of operational and technical control as may be necessary, and
he is authorized to obtain such information and intelligence material
from them as he may require. All instructions issued by the Director
under the authority provided in this paragraph shall be mandatory,
subject only to appeal to the Secretary of Defense by the Chief of
Service or head of civilian department or agency concerned.
e. Specific responsibilities of the Director of NSA include the
following:
(1) Formulating necessary operational plans and policies for
the conduct of the U.S. COMINT activities.
(2) Conducting COMINT activities, including research and
development, as required to meet the needs of the departments
and agencies which are authorized to receive the products of COMINT.
NSA CONTL. NO 7300405
COPY NUMBER 2
PAGE 6 ОҒ 8PAGES
6
TOP SECRET
TOP SECRET
COPY
(3) Determining; and submitting to appropriate authorities,
Requirements for logistic support for the conduct of COMINT
activities, together with specific recommendations as to what
each of the responsible departments and agencies of the
Government should apply.
(4) Within NSA's field of authorized operations prescribing
requisite security regulations covering operating practices,
including the transmission, handling and distribution of COMINT
material within and among the COMINT elements under his operational
or technical contro[1]; and exercising the necessary monitoring and
supervising control, including inspections if necessary, to ensure
compliance with the regulations.
(5) Subject to the authorities granted the Director of
Central Intelligence under NSCID No.5, conducting all iiaison
on COMINT matters with foreign governmental communications
intelligence agencies.
f. То the extent he deemd feasible and in consonance with the
aims of maximizing over-all efficiency, economy, and effectiveness, the
Director shall centralize or consolidate the performance of COMINT
functions for which he is responsible. ТЕ is recognized that in
certain circumstances elements of the Armed Forces and other agencies
being served will require close COMINT support. Where necessary for
this close support, direct operational control of specified COMINT
facilities and resources will be delegated by the Director, during
such periods and for such tasks as are determined by him, to military
commanders or the Chiefs of other agencies supported.
NSA CONTL. NO 7300405
COPY NUMBER 2 |
PAGE 7 OF 8 PAGES
COPY
TOP SECRET
TOP SECRET
g. The Director shall exercise such administrative control over
COMINT activities as he deems necessary to the effective/perfomance
of his mission. Otherwise, administrative control of personnel and
facilities will remain with the departments and agencies providing
them.
COPY
h. The Director shall make provision for participation by
representatives of each of the departments and agencies eligible to
receive COMINT products in those offices of NSA where priorities of
intercept and processing are finally planned.
i. The Director shall have a civilian deputy whose primary
responsibility shall be to ensure the mobilization and effective
employment of the best available human and scientific resources in
the field of cryptologic research and development.
j- Nothing in this directive shall contravene the responsi-
bilities of the individual departments and agencies for the final
evaluation of COMINT information, its synthesis with information
from other sources, and the dissemination of finished intelligence
to users.
3. The special nature of COMINT activities requires that they
be treated in all respects as being outside the framework of the general
intelligence activities. Orders, directives, policies, or recommendations of
any authority of the Executive Branch relating to the collection, production,
security, handling, dissemination, utilization of intelligence, and/or
Classified material, shall not be applicable to COMINT activities, unless
specifically so stated and issued by component departments or agency authority
represented on the Board. Other National Security Council Intelligence
Directives to the Director of Central Intelligence shall be construed as
non-applicable to COMINT activities, unless the National Security Council has
made its directive specifically applicable to COMINT. NSA CONTRL. NO. 7200405
COPY NUMBER 2
PAGE 8 OF 8PAGES
/s/ HARRY S. TRUMAN
TOP SECRET
eerie ра 5
ха Uniled Safes Senate °
August 29, 1975
Theodore P. Rosack
Special Agent In Charge
Denver Federal Building
1961 Stout Street
Denver, Colorado 80202
Dear Mr. Rosack:
For several months my office has been receiving reports of cattle
mutilations throughout Colorado and other western states. At least 130
cases in Colorado alone have been reported to local officials and the
Colorado Bureau of Investigation (C81); the CBI has verified that the
fncidents have occured for the last two years in nine states.
The ranchers and rural residents of Colorado are concerned and
frightened by these incidents. Тһе bizarre mutilations are frightening
in themselves: in virtually all the cases, the left ear, left eye, rectum
and sex organ of each animal has been cut away and the blood drained from
the carcass, but with no traces of blood left on the ground and no foot-
prints.
In Colorado's Morgan County area, there has also beei reports that
а helicopter was used by those who mutilated the carcasses of the cattle,
and several persons have reported being chased by a similar helicopter.
Because I am gravely concerned by this situation, I am asking that
the Federal Bureau of Investigation enter the case. Although the CBI
has been investigating the incidents, and local officials also have been
involved, the lack of a central unified direction has frustrated the fn-
vestigation. It seems to have progressed little, except for the
recognition at long last that the incidents must be taken seriously.
Ком 16 appears that ranchers are arming thenselves to protect their
Livestock, as well as their families and themselves, because they are
frustrated by the unsuccessful investigation. Clearly something must be
done before someone gets hurt.
HERE IS SOMETHING IMPORTANT.
There are reports of deaf people, that was being yelled at,
by angry voices, inside of their own minds, on the totally wrong language.
Like English, but Arab.
THEY were accidently hit with AUDIO that was not meant to be within THEM at all.
THE WHOLE SHO-BANG IN THEIR HEADS WAS MADE FOR SOME 'FOLKS' ELSEWHERE.
But apparently, there are something called 'making no sounds at all in the deaf people technology'.
You know, deaf people, people who can not hear,
they read lips, when talked to.
And they did not recognize this speech.
The whole shit was made for another Planet, completely.
THAT'S THE SHIT. 'SIR.
Let me repeat myself:
They did not recognize this speech.
Some of them are not deaf from birth, but still remembers conversations.
This Branch of Deaf People are harder to fuck around with. They all had perfect hearing recently.
The whole shit was made for another Planet, completely.
When? About 15 years ago. 2005-2007 somewhere. | read some Swedish newspaper writing about it.
And I picked it up again, a second time, when making languageschools for Political Avenue dot com. Category SIGN LANGUAGE.
I don't shit you. This happened. // С.М.
в
HERE ARE SOME TERMS AND ABBS YOU NEED TO KNOW ABOUT BEFORE READING CLASSIFIED DOCUMENTS.
BELOW ARE THE MOST COMMON DOCUMENT OR PROJECTION SLIDE SECRET CLASSIFICATION LABELS,
THAT YOU WILL FIND IN THE RESTRICTED PDF DOCUMENTS:
DTRA = Defense Threat Reduction Agency. CIA - Central Intelligence Agency.
Electromagnetic Pulse. 000 - Department of Defense.
Executive Order. FBI - Federal Bureau of Investigation.
For Official Use Only. FOIA - Freedom of Information Act.
In Accordance With. RAAF - Roswell Army Air Field.
Information Security Oversight Office.
Joint Publication.
Mission Critical System.
Militarily Critical Technologies List.
Mission-Oriented Protective Posture.
OPR = Office of Primary Responsibility.
SCG = Security Classification Guide.
к
п
е
5 .
E ow N W WW NOM NW и
EYES ONLY =PRESIDENT LEVEL. TWO POINTS ABOVE TOP SECRET. THIS CLASSIFICATION SEEMS ТО BE FORGOTTEN OR NOT USED FOR A LONG TIME.
TS =TOP SECRET.
NOFORN =NO FOREIGNERS. MOSTLY MEANS WHEN USA DENIES ALLIES LIKE UNITED KINGDOM ANY KNOWLEDGE OR INFORMATION.
_ SI =INFORMATION CLASSED AS SPECIAL INTELLIGENCE. ONE SECRECY POINT ABOVE TOP SECRET AND MORE RARE ТО BE APPROVED OF.
SG! =SPECIAL COMPARTMENTED INFORMATION. —НЕКЕ IS WHERE THE GOOD STUFF GETS HIDDEN.
^U: = Controlled Unclassified Information. Here it gets a little tricky.
DoD = Department of Defense.
DD Form = »Department of Defense Form (to fill in or check).
DoDD = Department of Defense Directive.
пой! = Department of Defense Instruction.
DoD = Department of Defense Manual.
EVEY =ONLY MEANT FOR THE FIVE EYES (SPYRING). They are the USA/UNITED KINGDOM/AUSTRALIA/NEW ZEALAND/CANADA.
OASD(NCE/CE) = Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense Programs.
ORCON = ORIGINATOR CONTROLLED. Only the ORIGINATOR may release the information.
S zSECRET INFORMATION. A LEVEL OF CLASSIFICATION OFTEN USED IN MILITARY PAPERS AND DOCUMENTS.
и zUNCLASSIFIED INFORMATION. YOU CAN SPEAK FREELY ABOUT THIS.
SS© =SPECIAL SOURCE OPERATIONS.
ГООО or CONFIDENTIAL Е FOR OFFICIAL USE ONLY . THE DOCUMENT CONTAINS GOVERNMENT INFORMATION THAT SHOULD NOT BE RELEASED TO THE PUBLIC.
SIGINT SIGNALS INTELLIGENCE. TRACKS INTERNET, RADIO TRANSMISSIONS, COMMUNICATIONS, GPS LOCATIONS, INDIVIDUAL PERSONS TRACKING ET CETERA.
SIGAD =SIGINT ACTIVITY DESIGNATOR. Determines the collection sources used, taken from within the produced information chain.
СОМІМТ =COMINT is the Communication Intelligence part of SIGINT (Signals Intelligence), dedicated to Electronic Warfare Operations.
SC =SECRET CODEWORD.
TSC =TOP SECRET CODEWORD.
COMIN T CODEWORD =A FIVELETTER WORD THAT PRIMARILY IDENTIFIES THE SOURCE OF THE COMINT INFORMATION THAT WAS КЕГАУЕО OR DOCUMENTED.
ОМЕНА ШЕ USED TOGETHER WITH ` ` IN A DOCUMENT - IT'S THE FIVELETTER CODEWORD THAT IDENTIFIES THE COMINT INFORMATION AS THE HIGHEST - CLASS 3.
202277 = The Chairman of the Joint Chiefs of Staff Manual.
СОД = Course of Action.
ССО =HANDLE МА COMINT CHANNELS ONLY . INFORMATION ONLY FOR PEOPLE WHO HAVE ACCESS TO READ COMINT MESSAGES AND DOCUMENTS NORMALLY.
PAPERTRAILS SOMETHING YOU CAN GET RID OF. PAPERS THAT POINT TO THAT YOU WERE A CRIMINAL WHEN AT WORK. I.E. —THE USE OF PAPER SHREDDERS.
СОВ =A PERSON YOU CAN NOT GET RID ОҒ. Many have tried. We advice not to try again. —Don't fuck with the Almighty. Or His Universe.
—Why are anyone interested іп you? Or in your communications?
Why would anyone attack your computer or smartphone?
Half world control, half target practice.
Otherwise one do not have world control .
File name:
File size:
Title:
Creation Date:
Modification Date:
Creator:
PDF Producer:
PDF Version:
Page Count:
Page Size:
Fast Web View:
heavy-national-security.pdf
105 MB (110,503,114 bytes)
© SWEDISH DEEP INVESTIGATION
REPORT. *** MADE AND PRODUCED BY
GUSTAV NORSTROM DATE 2023-03-19.
Working on the behalf of the Royal
Kingdom of Sweden. // Just type
www.hemligadokument.com in your
address bar and you will get this PDF in
the latest updated version via fully
automated server. (Servername:
goodeveningexpress.com)
GN - TELEPHONE: «00 46 073 970 2600.
Update on U.S.A. Government and
Extraterrestrials in the 1950's .
biohazard bioweapon bioweapons NTTR
extraterrestrial extraterrestrials alien aliens
ufo ufob Roswell MJ12 MJ-12 USA S4
AREA 51 Sweden Swedish Government
Sverige Hemliga Dokument utomjordingar
gustav norstrom restricted documents
important
3/19/2023, 12:57:00 PM
3/19/2023, 12:57:00 PM
GUSTAV NORSTROM, SWEDEN.
TELEPHONE: 00 46 073 970 26 00. ***
ADDRESS HEDEN 132, 82131 BOLLNAS,
SWEDEN. Working on the behalf of the
Royal Kingdom of Sweden
© SWEDISH DEEP INVESTIGATION REPORT
-- MADE AND PRODUCED BY GUSTAV
NORSTROM DATE 2023-03-19. Working on
the behalf of the Royal Kingdom of
Sweden for Governments worldwide.
1.7
622
436.5 x 170.4 mm (landscape)
INTRODUCTION.
14 - START READING RIGHT HERE.
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
PAGE
15
16
17
126
127
146
150
154
157
159
294
300
303
315
325
327
329
330
341
361
371
374
464
504
508
528
530
574
576
581
EXTRAS:
PAGE
PAGE
FHH
583
612
THE ROSWELL COVER-UP PART 2. PART ONE CAN BE READ LATER IN THIS DOCUMENT.
ROSWELL NEWSPAPER FRONTPAGE FROM 08 JULY 1947.
PHOTOGRAPHS OF EXRATERRESTRIAL (E.T.) DEAD BODY ON AMERICAN MILITARY AUTOPSY TABLE. 3 PHOTOS INCLUDING ONE ON IT'S BRAIN.
NEWLY ELECTED PRESIDENTS UFO BRIEFING DOCUMENTS FROM 18 NOVEMBER 1952. PAGE 20-26. ***
SHORT DESCRIPTIONS AND MY OWN PERSONAL PHOTOS OF DWIGHT D. EISENHOWER, HARRY S. TRUMAN, VANNEVAR BUSH, JAMES FORRESTAL AND MJ-1 HILLENKOETTER.
TAGGED AND BROKEN I-BEAM OF EXTRATERRESTRIAL UNKNOWN MATERIAL WITH HIEROGLYPHS. THE I-BEAM HAS A LIGHT-PURPLE COLOR.
DEAD ALIEN ON AUTOPSY TABLE.
THE REAL USA GOVERNMENT COUNTERSTRIKE UFO MANUAL - "EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY, RECOVERY AND DISPOSAL" - PRINTED 1954. AND LAST EDIT IN IT ARE FROM 1957. ***
ALIEN INSCRIPTIONS - SKETCH MADE BY JESSE MARCEL JUNIOR IN 1989 SHOWING THE ENGRAVED SYMBOLS FROM A SPACESHIP I-BEAM.
ALIEN INSCRIPTIONS - HAVE THE ROSWELL U.F.O. DEBRIS SYMBOLS BEEN DECIPHERED. SHORT BACKGROUND.
ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS WHEN A U.S. ARMY OFFICER HOLDS THE I-BEAM.
ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS THE I-BEAM WITH IT'S CORRECT ITEM TAG.
NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS SPACESHIP CONTROLS FOR 6-FINGER HANDS.
INFORMATION ON THE AREA 51 S4 FACILITY BASED ON 3 PERSONS WHO CLAIMS THAT THEY HAVE WORKED THERE.
INFORMATION ON THE DULCE MILITARY DNA FACILITY THAT CROSSBREEDS ANIMALS AND HUMANS. BASED MOSTLY ON 2 PERSONS WHO HAVE CLAIMED TO WORKED THERE. ONE HAS GONE MISSING INCLUDING HIS WHOLE FAMILY.
THE PHOTO SECTION IN THIS SWEDISH REPORT. SEE THE FIRST PHOTO OF A 6-FINGERED EXTRATERRESTRIAL INDIVIDUAL.
HOW CAN YOU PLACE "AN OBJECT OR FLUID ON THE OTHER SIDE" - AND EXACTLY WHAT IS "THE SNAKE" MENTIONED IN THE HOLY BIBLE, OR "THE SERPENTS" ANCIENT CIVILISATIONS SPOKE OF.
THE PHOTO SECTION CONTINUES WITH MORE PHOTO'S, MAPS, SATELLITE IMAGES AND TECHNICAL DATA. THE FIRST IMAGE SHOWS A CUBAN AIRPORT WITH ALIEN SPACESHIP LANDING MARKINGS.
ROSWELL DISPATCH NEWSPAPER FRONTPAGE FROM 09 JULY 1947.
EXTRATERRESTRIAL ALIEN POETRY AND WISDOM.
PHOTO OF SOME KIND OF "E.T. WEAPON". Obviously, one can determine that the electric lighting comes from the beam pointed down. The picture is real and not photoshopped.
DIFFERENT RADAR DESCRIPTIONS. PRIMARY AND SECONDARY RADAR SCREENS.
UNITED STATES PATENTS ABOUT BRAINWAVES AND REMOTE ANTENNA MINDCONTROL.
UNITED STATES ACTIVE DENIAL TRUCKS. PUBLIC EXPLANATION ARE BURNING SKIN GROUP CONTROL. BUT ACTIVE DENIAL CAN SUPPRESS THOUGHTS SO SOME DECISIONS BECOME IMPOSSIBLE TO PERFORM.
OUR OWN FEDERAL AVIATION ADMINISTRATIONS AIR TRAFFIC SURVEILLANCE - THAT E.T. TAPPED IN TO, OR HAVE SYSTEM ACCESS TO. THEY KNOW WHERE ALL OUR AIRCRAFT ARE - WHEN FAKING A AIRPORT.
RADIO AND ELECTRO MAGNETIC RADIATION SAFETY LEVELS.
EMF AND RF SAFETY LEVELS - A COMPARATIVE GUIDE.
NOT FOR PUBLIC INSPECTION. ONE PAGE DOCUMENT FRAGMENT.
TWO PAGE DOCUMENT THAT MENTION PROFESSOR ALBERT EINSTEIN AS THE PROJECT JEHOVA DIRECTOR. [Document found in John Foster Dulles security safe. ]
PHOTO OF JOHN FOSTER DULLES. [He served as United States Secretary of State under President Eisenhower 1953-1959.]
CLEAN WRITING OF THE ABOVE TWO PAGE DOCUMENT. [Document from above that was found in John Foster Dulles security safe, now with clean text, and easier to read. ]
MJ-12 TOP SECRET/MAJESTIC / THE FIFTH ANNUAL REPORT END CONCLUSION. THE REPORT ARE REAL U.S. GOVERNMENT PROPERTY. ***
U.S. PATENT - APPARATUS FOR AUDIBLY COMMUNICATING SPEECH USING THE RADIO FREQUENCY HEARING EFFECT.
WHAT ARE THE EXTRATERRESTRIALS DOING HERE *EXACTLY*. HERE IS A SHORT SUMMARY. THIS IS WHAT THEY DO, IF, THEY, THEORETICALLY, EXIST.
PENTAGON AND THE U.S.A. DEFENSE BUDGET 2017-2018. INCLUDES DESCRIPTIONS OF ALMOST ALL WEAPON SYSTEMS AND THE AIR FORCE ONE.
THE NSA COMPUTER NETWORK SECURITY GUIDE. MOST NSA SPY SERVERS ARE LISTED WITH THEIR OPERATING TCP/UDP PORTS. READ WHAT THE NATIONAL SECURITY AGENCY SAY YOU SHOULD BLOCK.
CIA AND THE HAVANA SYNDROME.
NEW PHOTO SECTION: MORE AREA 51 PHOTOS.
TWICE THE SPEED OF LIGHT.
ALL USA INTELLIGENCE AGENCIES BLACK BUDGETS 2013.
BOKSTAVERINGSALFABETET. SWEDISH AND INTERNATIONAL.
PHOTO ON U.F.O. CHASED BY THE U.S. MILITARY.
AUTHORS IDENTIFICATION.
CLEAN WRITING OF THE MJ-12 MANUAL. THESE PAGES ARE EASIER TO READ.
A DIRECTIVE TO THE UNITED STATES COMMUNICATIONS AND INTELLIGENCE BOARD (USCIB). SUBJECT: COMMUNICATIONS INTELLIGENCE ACTIVITIES. WRITTEN 24:TH OCTOBER 1952. ***
GO BACK TO PAGE 97 - AND IN THE PHOTO SECTION OF THIS REPORT // SEE THE DOCUMENT ABOUT MURDERING SECRETARY OF DEFENSE FORRESTAL THAT WISHED TO GO PUBLIC WITH U.F.O.
First he was placed in a mental hospital, and then he was thrown out of a window there.
Did they give him a poison before he went to the mental hospital?
All pictures are real and not photoshopped. There are more than 100 photos and images herein.
© SWEDISH DEEP INVESTIGATION MADE AND PRODUCED BY GUSTAV NORSTRÓM DATE 2023-03-24.
Working on behalf of the Royal Kingdom of Sweden for all Governments worldwide.
*** = ALL THE 1950"5 DOCUMENTS INDEXED ABOVE ARE REAL U.S. GOVERNMENT PROPERTY.
I don't personally speculate in this REPORT, about the accuracy and written truths served to you from these 1950's documents.
I only guarantee you that the old external documents published herein this SWEDISH PDF REPORT, are real U.S. GOVERNMENT PROPERTY from the 1950's.
Educate yourself by reading these GOVERNMENT PAPERS.
Our governments are our neighbors, but our neighbor does not tell us everything, and often deceives us.
| made some damn PDF about space and the moon, but іп my
factfinding, | got really stuck on some stuff. A mouse that looks like а
frog. Mutilated cows. Genitalia and eyes removed. Is there any
background to all that? And then you find a military lab down in a
mountain range where they are working on DNA. Right next to the
field where a State Trooper, (Traffic Police we should have said),
anyway, he, found а cow with a "calf" inside, which looked like a frog, a
fish and a human. And this within 10 miles of the DNA military lab in
the mountain. Is it that simple?
IT FUCKING LOOKS LIKE IT. " / Gustav Norstróm.
Modell: 5
Polisbil 2020 SAPO. ус
Skrämljus med sidriktad
vit trottoarbelysning
från STANDBY.
nt
М”
FORSTARKNINGSVAPEN | l
| VÀRA PASSAGERARE | E SAKERHETS-
| VISTAS BAKOM | 22223
\ DENNA BILDORR. TT
\ Kontakta Polisen pa nummer 112. SWEDISH
\ For Police please dial number 112. SECURITY
| POLICE
SKRAMSELEFFEKT: X X X X Xv FEM STJÄRNOR AV FEM MÖJLIGA.
Jag frágade еп Це): Tank om SAPO stannade utanfér er villa och tog med sig din kille.
Fattaru vilken skillnad det àr om en vanlig civilpolisbil stannar eller om det àr den hàr
fräna versionen? "-Dà blir man ju skraj sa hon. Om man ser den dar jävla bilen!”
Det аг meningen ocksa sa jag. Eller sa star man utanfór den Kinesiska Ambassaden,
OCH BARA BLINKAR LITE EN STUND.
VAD TYX OM BILEN?
Jag satt någon helg för två ar sedan med еп dyr flaska rödvin och en dator, och gjorde bilen ovan.
Мағ jag tanker efter sa var det kanske 2-3 flaskor ródvin och lite tabletter. Lite patand sa dar.
DET AR KANSKE 3 AR SEDAN OCH FEM FLASKOR RÓDVIN. ELLER NYINKÓPT HANDSPRIT MED COCA-COLA.
SAME SHIT!
KOLLA GALLREN РА PASSAGERARSIDAN BADE FRAMAT OCH ВАКАТ. KAN INTE SAPO AKA RUNT JAMNT
I STOCKHOLM, MED DEN HAR BILEN, OCH HA FORSTARKNINGSVAPEN TILL ALLA I LADORNA DAR BAK.
Fotar man dessutom personer fran den har bilen, sa sátter man ju nojor i huvudet
pa dem som man fotar av. DET AR DET SOM AR AVSIKTEN !
SA DE GOR BORT SIG SENARE PGA NOJOR.
AV: 740621-1750
VIDEOLINKS
The link address to the U.S. MILITARY FOOTAGE ARCHIVE FILMS saved on website.
You can also listen to the original audio from the ABC RADIO NATIONWIDE
Newsflash the 8:th of July 1947.
https://restricteddocuments.com/NEWSFLASH.mp4
Chemtrails Video. It's not about one picture, which might be explainable,
but the amount of images, which needs another Government answer.
https://restricteddocuments.com/Emergency-BroadcastSWEDEN1.mp4
Federal Reserve. It's about cash.
https://restricteddocuments.com/FIRST%2@LOOK%20insidex2ethe%2OF EDERAL%Z2ZORESERVE%
2028.04.2013%20 Full%2@Lenght_.mp4
Sida 1